Skip to content

Commit 7ce164d

Browse files
fix(deps): update terraform-module (#136)
1 parent bfb730f commit 7ce164d

File tree

8 files changed

+21
-21
lines changed

8 files changed

+21
-21
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ You need the following permissions to run this module.
7474

7575
| Name | Source | Version |
7676
|------|--------|---------|
77-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.22.1 |
77+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.22.2 |
7878

7979
### Resources
8080

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "resource_group" {
22
source = "terraform-ibm-modules/resource-group/ibm"
3-
version = "1.1.5"
3+
version = "1.1.6"
44
# if an existing resource group is not set (null) create a new one using prefix
55
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
66
existing_resource_group_name = var.resource_group

examples/complete/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ This examples handles the provisioning of a new Secrets Manager instance.
1414

1515
| Name | Source | Version |
1616
|------|--------|---------|
17-
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.4.2 |
18-
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.13.1 |
19-
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.5 |
17+
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.5.3 |
18+
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.13.2 |
19+
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
2020
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
2121

2222
### Resources

examples/complete/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
module "resource_group" {
22
source = "terraform-ibm-modules/resource-group/ibm"
3-
version = "1.1.5"
3+
version = "1.1.6"
44
# if an existing resource group is not set (null) create a new one using prefix
55
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
66
existing_resource_group_name = var.resource_group
77
}
88

99
module "key_protect" {
1010
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
11-
version = "4.13.1"
11+
version = "4.13.2"
1212
key_protect_instance_name = "${var.prefix}-key-protect"
1313
resource_group_id = module.resource_group.resource_group_id
1414
region = var.region
@@ -28,7 +28,7 @@ module "key_protect" {
2828

2929
module "event_notification" {
3030
source = "terraform-ibm-modules/event-notifications/ibm"
31-
version = "1.4.2"
31+
version = "1.5.3"
3232
resource_group_id = module.resource_group.resource_group_id
3333
name = "${var.prefix}-en"
3434
tags = var.resource_tags

examples/fscloud/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
##############################################################################
44
module "resource_group" {
55
source = "terraform-ibm-modules/resource-group/ibm"
6-
version = "1.1.5"
6+
version = "1.1.6"
77
# if an existing resource group is not set (null) create a new one using prefix
88
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
99
existing_resource_group_name = var.resource_group
@@ -30,7 +30,7 @@ resource "ibm_is_vpc" "vpc" {
3030
##############################################################################
3131
module "cbr_zone" {
3232
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
33-
version = "1.22.1"
33+
version = "1.22.2"
3434
name = "${var.prefix}-CBR-zone"
3535
zone_description = "CBR Network zone representing VPC"
3636
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -42,7 +42,7 @@ module "cbr_zone" {
4242

4343
module "event_notification" {
4444
source = "terraform-ibm-modules/event-notifications/ibm"
45-
version = "1.4.2"
45+
version = "1.5.3"
4646
resource_group_id = module.resource_group.resource_group_id
4747
name = "${var.prefix}-en"
4848
tags = var.resource_tags

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ locals {
7474
module "cbr_rule" {
7575
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
7676
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
77-
version = "1.22.1"
77+
version = "1.22.2"
7878
rule_description = var.cbr_rules[count.index].description
7979
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
8080
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/standard/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ locals {
99
module "resource_group" {
1010
count = var.existing_secrets_manager_crn == null ? 1 : 0
1111
source = "terraform-ibm-modules/resource-group/ibm"
12-
version = "1.1.5"
12+
version = "1.1.6"
1313
resource_group_name = var.use_existing_resource_group == false ? (var.prefix != null ? "${var.prefix}-${var.resource_group_name}" : var.resource_group_name) : null
1414
existing_resource_group_name = var.use_existing_resource_group == true ? var.resource_group_name : null
1515
}
@@ -34,7 +34,7 @@ module "kms" {
3434
}
3535
count = var.existing_secrets_manager_crn != null || var.existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
3636
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
37-
version = "4.13.1"
37+
version = "4.13.2"
3838
create_key_protect_instance = false
3939
region = local.kms_region
4040
existing_kms_instance_guid = local.existing_kms_guid
@@ -95,7 +95,7 @@ module "secrets_manager" {
9595
module "iam_secrets_engine" {
9696
count = var.iam_engine_enabled ? 1 : 0
9797
source = "terraform-ibm-modules/secrets-manager-iam-engine/ibm"
98-
version = "1.2.1"
98+
version = "1.2.2"
9999
region = local.secrets_manager_region
100100
iam_engine_name = var.prefix != null ? "${var.prefix}-${var.iam_engine_name}" : var.iam_engine_name
101101
secrets_manager_guid = local.secrets_manager_guid
@@ -113,7 +113,7 @@ locals {
113113
module "secrets_manager_public_cert_engine" {
114114
count = var.public_engine_enabled ? 1 : 0
115115
source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
116-
version = "1.0.0"
116+
version = "1.0.1"
117117
providers = {
118118
ibm = ibm
119119
ibm.secret-store = ibm
@@ -133,7 +133,7 @@ module "secrets_manager_public_cert_engine" {
133133
module "private_secret_engine" {
134134
count = var.private_engine_enabled ? 1 : 0
135135
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
136-
version = "1.3.1"
136+
version = "1.3.2"
137137
secrets_manager_guid = local.secrets_manager_guid
138138
region = var.region
139139
root_ca_name = var.root_ca_name

tests/existing-resources/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.1.5"
7+
version = "1.1.6"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "event_notifications" {
1818
source = "terraform-ibm-modules/event-notifications/ibm"
19-
version = "1.4.2"
19+
version = "1.5.3"
2020
resource_group_id = module.resource_group.resource_group_id
2121
name = "${var.prefix}-en"
2222
tags = var.resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
3131

3232
module "key_protect" {
3333
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
34-
version = "4.13.1"
34+
version = "4.13.2"
3535
key_protect_instance_name = "${var.prefix}-key-protect"
3636
resource_group_id = module.resource_group.resource_group_id
3737
region = var.region
@@ -55,7 +55,7 @@ module "key_protect" {
5555

5656
module "secrets_manager" {
5757
source = "terraform-ibm-modules/secrets-manager/ibm"
58-
version = "1.13.4"
58+
version = "1.13.6"
5959
resource_group_id = module.resource_group.resource_group_id
6060
region = var.region
6161
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure

0 commit comments

Comments
 (0)