File tree Expand file tree Collapse file tree 4 files changed +6
-6
lines changed Expand file tree Collapse file tree 4 files changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -127,7 +127,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
127
127
128
128
module "cbr_vpc_zone" {
129
129
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
130
- version = " 1.30 .0"
130
+ version = " 1.31 .0"
131
131
name = " ${ var . prefix } -VPC-network-zone"
132
132
zone_description = " CBR Network zone representing VPC"
133
133
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
@@ -139,7 +139,7 @@ module "cbr_vpc_zone" {
139
139
140
140
module "cbr_zone_schematics" {
141
141
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
142
- version = " 1.30 .0"
142
+ version = " 1.31 .0"
143
143
name = " ${ var . prefix } -schematics-zone"
144
144
zone_description = " CBR Network zone containing Schematics"
145
145
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -40,7 +40,7 @@ You need the following permissions to run this module.
40
40
41
41
| Name | Source | Version |
42
42
| ------| --------| ---------|
43
- | <a name =" module_cbr_rules " ></a > [ cbr\_ rules] ( #module\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30 .0 |
43
+ | <a name =" module_cbr_rules " ></a > [ cbr\_ rules] ( #module\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31 .0 |
44
44
45
45
### Resources
46
46
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ resource "ibm_code_engine_project" "ce_project" {
16
16
module "cbr_rules" {
17
17
count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
18
18
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
19
- version = " 1.30 .0"
19
+ version = " 1.31 .0"
20
20
rule_description = var. cbr_rules [count . index ]. description
21
21
enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
22
22
rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.6 "
7
+ version = " 1.2.0 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -24,7 +24,7 @@ data "ibm_sm_public_certificate" "public_certificate" {
24
24
25
25
module "namespace" {
26
26
source = " terraform-ibm-modules/container-registry/ibm"
27
- version = " 1.3.5 "
27
+ version = " 1.4.2 "
28
28
namespace_name = " ${ var . prefix } -namespace"
29
29
resource_group_id = module. resource_group . resource_group_id
30
30
images_per_repo = 1
You can’t perform that action at this time.
0 commit comments