Skip to content

Commit 29fa311

Browse files
fix(deps): update terraform terraform-ibm-modules/kms-all-inclusive/ibm to v5 (#324)
1 parent 047169a commit 29fa311

File tree

5 files changed

+5
-5
lines changed

5 files changed

+5
-5
lines changed

examples/complete/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This examples handles the provisioning of a new Secrets Manager instance.
1616
| Name | Source | Version |
1717
|------|--------|---------|
1818
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.20.0 |
19-
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.22.0 |
19+
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.1 |
2020
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
2121
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
2222

examples/complete/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ module "resource_group" {
88

99
module "key_protect" {
1010
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
11-
version = "4.22.0"
11+
version = "5.0.1"
1212
key_protect_instance_name = "${var.prefix}-key-protect"
1313
resource_group_id = module.resource_group.resource_group_id
1414
region = var.region

solutions/fully-configurable/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ This solution supports the following:
2424

2525
| Name | Source | Version |
2626
|------|--------|---------|
27-
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.22.0 |
27+
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.1 |
2828
| <a name="module_kms_instance_crn_parser"></a> [kms\_instance\_crn\_parser](#module\_kms\_instance\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
2929
| <a name="module_kms_key_crn_parser"></a> [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3030
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ module "kms" {
130130
}
131131
count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
132132
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
133-
version = "4.22.0"
133+
version = "5.0.1"
134134
create_key_protect_instance = false
135135
region = local.kms_region
136136
existing_kms_instance_crn = var.existing_kms_instance_crn

tests/existing-resources/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ module "event_notifications" {
3131

3232
module "key_protect" {
3333
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
34-
version = "4.22.0"
34+
version = "5.0.1"
3535
key_protect_instance_name = "${var.prefix}-key-protect"
3636
resource_group_id = module.resource_group.resource_group_id
3737
region = var.region

0 commit comments

Comments
 (0)