File tree 9 files changed +12
-12
lines changed
solutions/fully-configurable 9 files changed +12
-12
lines changed Original file line number Diff line number Diff line change @@ -15,8 +15,8 @@ This examples handles the provisioning of a new Secrets Manager instance.
15
15
16
16
| Name | Source | Version |
17
17
| ------| --------| ---------|
18
- | <a name =" module_event_notification " ></a > [ event\_ notification] ( #module\_ event\_ notification ) | terraform-ibm-modules/event-notifications/ibm | 2.2.2 |
19
- | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.4 |
18
+ | <a name =" module_event_notification " ></a > [ event\_ notification] ( #module\_ event\_ notification ) | terraform-ibm-modules/event-notifications/ibm | 2.2.4 |
19
+ | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.5 |
20
20
| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
21
21
| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | ../.. | n/a |
22
22
Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ module "resource_group" {
8
8
9
9
module "key_protect" {
10
10
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
11
- version = " 5.1.4 "
11
+ version = " 5.1.5 "
12
12
key_protect_instance_name = " ${ var . prefix } -key-protect"
13
13
resource_group_id = module. resource_group . resource_group_id
14
14
region = var. region
@@ -27,7 +27,7 @@ module "key_protect" {
27
27
28
28
module "event_notification" {
29
29
source = " terraform-ibm-modules/event-notifications/ibm"
30
- version = " 2.2.2 "
30
+ version = " 2.2.4 "
31
31
resource_group_id = module. resource_group . resource_group_id
32
32
name = " ${ var . prefix } -en"
33
33
tags = var. resource_tags
Original file line number Diff line number Diff line change @@ -42,7 +42,7 @@ module "cbr_zone" {
42
42
43
43
module "event_notification" {
44
44
source = " terraform-ibm-modules/event-notifications/ibm"
45
- version = " 2.2.2 "
45
+ version = " 2.2.4 "
46
46
resource_group_id = module. resource_group . resource_group_id
47
47
name = " ${ var . prefix } -en"
48
48
tags = var. resource_tags
Original file line number Diff line number Diff line change @@ -50,7 +50,7 @@ module "secrets_manager" {
50
50
51
51
| Name | Source | Version |
52
52
| ------| --------| ---------|
53
- | <a name =" module_secret_groups " ></a > [ secret\_ groups] ( #module\_ secret\_ groups ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.5 |
53
+ | <a name =" module_secret_groups " ></a > [ secret\_ groups] ( #module\_ secret\_ groups ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.6 |
54
54
| <a name =" module_secrets " ></a > [ secrets] ( #module\_ secrets ) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.7.0 |
55
55
56
56
### Resources
Original file line number Diff line number Diff line change @@ -25,7 +25,7 @@ data "ibm_sm_secret_groups" "existing_secret_groups" {
25
25
module "secret_groups" {
26
26
for_each = { for obj in local . secret_groups : obj . secret_group_name => obj }
27
27
source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
28
- version = " 1.3.5 "
28
+ version = " 1.3.6 "
29
29
region = var. existing_sm_instance_region
30
30
secrets_manager_guid = var. existing_sm_instance_guid
31
31
secret_group_name = each. value . secret_group_name
Original file line number Diff line number Diff line change @@ -24,7 +24,7 @@ This solution supports the following:
24
24
25
25
| Name | Source | Version |
26
26
| ------| --------| ---------|
27
- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.4 |
27
+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.5 |
28
28
| <a name =" module_kms_instance_crn_parser " ></a > [ kms\_ instance\_ crn\_ parser] ( #module\_ kms\_ instance\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
29
29
| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
30
30
| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
Original file line number Diff line number Diff line change @@ -130,7 +130,7 @@ module "kms" {
130
130
}
131
131
count = var. existing_secrets_manager_crn == null && var. kms_encryption_enabled && var. existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
132
132
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
133
- version = " 5.1.4 "
133
+ version = " 5.1.5 "
134
134
create_key_protect_instance = false
135
135
region = local. kms_region
136
136
existing_kms_instance_crn = var. existing_kms_instance_crn
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
16
16
17
17
module "event_notifications" {
18
18
source = " terraform-ibm-modules/event-notifications/ibm"
19
- version = " 2.2.2 "
19
+ version = " 2.2.4 "
20
20
resource_group_id = module. resource_group . resource_group_id
21
21
name = " ${ var . prefix } -en"
22
22
tags = var. resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
31
31
32
32
module "key_protect" {
33
33
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
34
- version = " 5.1.4 "
34
+ version = " 5.1.5 "
35
35
key_protect_instance_name = " ${ var . prefix } -key-protect"
36
36
resource_group_id = module. resource_group . resource_group_id
37
37
region = var. region
Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ module "resource_group" {
17
17
module "secrets_manager" {
18
18
count = var. provision_secrets_manager == true ? 1 : 0
19
19
source = " terraform-ibm-modules/secrets-manager/ibm"
20
- version = " 2.2.7 " # Replace "X.X.X" with a release version to lock into a specific release
20
+ version = " 2.2.9 " # Replace "X.X.X" with a release version to lock into a specific release
21
21
resource_group_id = module. resource_group . resource_group_id
22
22
region = var. region
23
23
secrets_manager_name = " ${ var . prefix } -tsm"
You can’t perform that action at this time.
0 commit comments