File tree 5 files changed +5
-5
lines changed
solutions/fully-configurable 5 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ This examples handles the provisioning of a new Secrets Manager instance.
16
16
| Name | Source | Version |
17
17
| ------| --------| ---------|
18
18
| <a name =" module_event_notification " ></a > [ event\_ notification] ( #module\_ event\_ notification ) | terraform-ibm-modules/event-notifications/ibm | 1.20.0 |
19
- | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.22.0 |
19
+ | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.1 |
20
20
| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
21
21
| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | ../.. | n/a |
22
22
Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ module "resource_group" {
8
8
9
9
module "key_protect" {
10
10
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
11
- version = " 4.22.0 "
11
+ version = " 5.0.1 "
12
12
key_protect_instance_name = " ${ var . prefix } -key-protect"
13
13
resource_group_id = module. resource_group . resource_group_id
14
14
region = var. region
Original file line number Diff line number Diff line change @@ -24,7 +24,7 @@ This solution supports the following:
24
24
25
25
| Name | Source | Version |
26
26
| ------| --------| ---------|
27
- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.22.0 |
27
+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.1 |
28
28
| <a name =" module_kms_instance_crn_parser " ></a > [ kms\_ instance\_ crn\_ parser] ( #module\_ kms\_ instance\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
29
29
| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
30
30
| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
Original file line number Diff line number Diff line change @@ -130,7 +130,7 @@ module "kms" {
130
130
}
131
131
count = var. existing_secrets_manager_crn == null && var. kms_encryption_enabled && var. existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
132
132
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
133
- version = " 4.22.0 "
133
+ version = " 5.0.1 "
134
134
create_key_protect_instance = false
135
135
region = local. kms_region
136
136
existing_kms_instance_crn = var. existing_kms_instance_crn
Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ module "event_notifications" {
31
31
32
32
module "key_protect" {
33
33
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
34
- version = " 4.22.0 "
34
+ version = " 5.0.1 "
35
35
key_protect_instance_name = " ${ var . prefix } -key-protect"
36
36
resource_group_id = module. resource_group . resource_group_id
37
37
region = var. region
You can’t perform that action at this time.
0 commit comments