@@ -80,20 +80,20 @@ locals {
80
80
module "resource_group" {
81
81
for_each = local. rg_map
82
82
source = " terraform-ibm-modules/resource-group/ibm"
83
- version = " 1.1.5 "
83
+ version = " 1.1.6 "
84
84
resource_group_name = each. key
85
85
}
86
86
87
87
module "existing_resource_group" {
88
88
count = var. existing_cos_resource_group_name != null ? 1 : 0
89
89
source = " terraform-ibm-modules/resource-group/ibm"
90
- version = " 1.1.5 "
90
+ version = " 1.1.6 "
91
91
existing_resource_group_name = var. existing_cos_resource_group_name
92
92
}
93
93
94
94
module "account_settings" {
95
95
source = " terraform-ibm-modules/iam-account-settings/ibm"
96
- version = " 2.10.0 "
96
+ version = " 2.10.1 "
97
97
access_token_expiration = var. access_token_expiration
98
98
active_session_timeout = var. active_session_timeout
99
99
allowed_ip_addresses = var. allowed_ip_addresses
@@ -114,7 +114,7 @@ module "account_settings" {
114
114
module "cos" {
115
115
count = var. provision_atracker_cos ? 1 : 0
116
116
source = " terraform-ibm-modules/cos/ibm//modules/fscloud"
117
- version = " 8.3.2 "
117
+ version = " 8.4.0 "
118
118
resource_group_id = local. cos_rg
119
119
bucket_configs = [{
120
120
access_tags = var.cos_bucket_access_tags
@@ -155,7 +155,7 @@ module "cos" {
155
155
module "activity_tracker" {
156
156
count = var. provision_atracker_cos ? 1 : 0
157
157
source = " terraform-ibm-modules/observability-instances/ibm//modules/activity_tracker"
158
- version = " 2.12.2 "
158
+ version = " 2.13.1 "
159
159
providers = {
160
160
logdna.at = logdna.at
161
161
}
@@ -188,7 +188,7 @@ moved {
188
188
module "trusted_profile_projects" {
189
189
count = var. provision_trusted_profile_projects ? 1 : 0
190
190
source = " terraform-ibm-modules/trusted-profile/ibm"
191
- version = " 1.0.3 "
191
+ version = " 1.0.4 "
192
192
trusted_profile_name = var. trusted_profile_name
193
193
trusted_profile_description = var. trusted_profile_description
194
194
trusted_profile_policies = [{
0 commit comments