Skip to content

Commit 9f11903

Browse files
fix(deps): update terraform dependencies (#497)
1 parent a559555 commit 9f11903

File tree

6 files changed

+9
-9
lines changed

6 files changed

+9
-9
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ To create service credentials, access the Event Notifications service, and acces
7676

7777
| Name | Source | Version |
7878
|------|--------|---------|
79-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.0 |
79+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.2 |
8080

8181
### Resources
8282

examples/complete/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ locals {
2121

2222
module "key_protect_all_inclusive" {
2323
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
24-
version = "5.1.8"
24+
version = "5.1.9"
2525
resource_group_id = module.resource_group.resource_group_id
2626
region = var.region
2727
key_protect_instance_name = "${var.prefix}-kp"

examples/fscloud/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
4040

4141
module "cbr_vpc_zone" {
4242
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
43-
version = "1.32.0"
43+
version = "1.32.2"
4444
name = "${var.prefix}-VPC-network-zone"
4545
zone_description = "CBR Network zone representing VPC"
4646
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -52,7 +52,7 @@ module "cbr_vpc_zone" {
5252

5353
module "cbr_zone_schematics" {
5454
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
55-
version = "1.32.0"
55+
version = "1.32.2"
5656
name = "${var.prefix}-schematics-zone"
5757
zone_description = "CBR Network zone containing Schematics"
5858
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ resource "time_sleep" "wait_for_kms_authorization_policy" {
192192
module "cbr_rule" {
193193
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
194194
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
195-
version = "1.32.0"
195+
version = "1.32.2"
196196
rule_description = var.cbr_rules[count.index].description
197197
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
198198
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/fully-configurable/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,9 @@ When `existing_en_instance_crn` is passed, this solution ignores ALL other input
4040
| <a name="module_existing_kms_crn_parser"></a> [existing\_kms\_crn\_parser](#module\_existing\_kms\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
4141
| <a name="module_existing_kms_key_crn_parser"></a> [existing\_kms\_key\_crn\_parser](#module\_existing\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
4242
| <a name="module_existing_sm_crn_parser"></a> [existing\_sm\_crn\_parser](#module\_existing\_sm\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
43-
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.8 |
43+
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.9 |
4444
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.1 |
45-
| <a name="module_secrets_manager_service_credentials"></a> [secrets\_manager\_service\_credentials](#module\_secrets\_manager\_service\_credentials) | terraform-ibm-modules/secrets-manager/ibm//modules/secrets | 2.6.3 |
45+
| <a name="module_secrets_manager_service_credentials"></a> [secrets\_manager\_service\_credentials](#module\_secrets\_manager\_service\_credentials) | terraform-ibm-modules/secrets-manager/ibm//modules/secrets | 2.6.5 |
4646

4747
### Resources
4848

solutions/fully-configurable/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ module "kms" {
6363
}
6464
count = local.create_kms_keys ? 1 : 0
6565
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
66-
version = "5.1.8"
66+
version = "5.1.9"
6767
create_key_protect_instance = false
6868
region = local.kms_region
6969
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -357,7 +357,7 @@ module "secrets_manager_service_credentials" {
357357
count = length(local.service_credential_secrets) > 0 ? 1 : 0
358358
depends_on = [time_sleep.wait_for_en_authorization_policy]
359359
source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
360-
version = "2.6.3"
360+
version = "2.6.5"
361361
existing_sm_instance_guid = local.existing_secrets_manager_instance_guid
362362
existing_sm_instance_region = local.existing_secrets_manager_instance_region
363363
endpoint_type = var.existing_secrets_manager_endpoint_type

0 commit comments

Comments
 (0)