File tree 12 files changed +23
-23
lines changed
solutions/fully-configurable 12 files changed +23
-23
lines changed Original file line number Diff line number Diff line change @@ -75,7 +75,7 @@ You need the following permissions to run this module.
75
75
76
76
| Name | Source | Version |
77
77
| ------| --------| ---------|
78
- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.29 .0 |
78
+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31 .0 |
79
79
| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
80
80
| <a name =" module_secrets " ></a > [ secrets] ( #module\_ secrets ) | ./modules/secrets | n/a |
81
81
Original file line number Diff line number Diff line change 1
1
module "resource_group" {
2
2
source = " terraform-ibm-modules/resource-group/ibm"
3
- version = " 1.1.6 "
3
+ version = " 1.2.0 "
4
4
# if an existing resource group is not set (null) create a new one using prefix
5
5
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
6
6
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change @@ -15,9 +15,9 @@ This examples handles the provisioning of a new Secrets Manager instance.
15
15
16
16
| Name | Source | Version |
17
17
| ------| --------| ---------|
18
- | <a name =" module_event_notification " ></a > [ event\_ notification] ( #module\_ event\_ notification ) | terraform-ibm-modules/event-notifications/ibm | 1.19.4 |
19
- | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.21.3 |
20
- | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
18
+ | <a name =" module_event_notification " ></a > [ event\_ notification] ( #module\_ event\_ notification ) | terraform-ibm-modules/event-notifications/ibm | 1.19.20 |
19
+ | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.22.0 |
20
+ | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
21
21
| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | ../.. | n/a |
22
22
23
23
### Resources
Original file line number Diff line number Diff line change 1
1
module "resource_group" {
2
2
source = " terraform-ibm-modules/resource-group/ibm"
3
- version = " 1.1.6 "
3
+ version = " 1.2.0 "
4
4
# if an existing resource group is not set (null) create a new one using prefix
5
5
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
6
6
existing_resource_group_name = var. resource_group
7
7
}
8
8
9
9
module "key_protect" {
10
10
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
11
- version = " 4.21.3 "
11
+ version = " 4.22.0 "
12
12
key_protect_instance_name = " ${ var . prefix } -key-protect"
13
13
resource_group_id = module. resource_group . resource_group_id
14
14
region = var. region
@@ -27,7 +27,7 @@ module "key_protect" {
27
27
28
28
module "event_notification" {
29
29
source = " terraform-ibm-modules/event-notifications/ibm"
30
- version = " 1.19.4 "
30
+ version = " 1.19.20 "
31
31
resource_group_id = module. resource_group . resource_group_id
32
32
name = " ${ var . prefix } -en"
33
33
tags = var. resource_tags
Original file line number Diff line number Diff line change 3
3
# #############################################################################
4
4
module "resource_group" {
5
5
source = " terraform-ibm-modules/resource-group/ibm"
6
- version = " 1.1.6 "
6
+ version = " 1.2.0 "
7
7
# if an existing resource group is not set (null) create a new one using prefix
8
8
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
9
9
existing_resource_group_name = var. resource_group
@@ -30,7 +30,7 @@ resource "ibm_is_vpc" "vpc" {
30
30
# #############################################################################
31
31
module "cbr_zone" {
32
32
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
33
- version = " 1.29 .0"
33
+ version = " 1.31 .0"
34
34
name = " ${ var . prefix } -CBR-zone"
35
35
zone_description = " CBR Network zone representing VPC"
36
36
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
@@ -42,7 +42,7 @@ module "cbr_zone" {
42
42
43
43
module "event_notification" {
44
44
source = " terraform-ibm-modules/event-notifications/ibm"
45
- version = " 1.19.4 "
45
+ version = " 1.19.20 "
46
46
resource_group_id = module. resource_group . resource_group_id
47
47
name = " ${ var . prefix } -en"
48
48
tags = var. resource_tags
Original file line number Diff line number Diff line change @@ -163,7 +163,7 @@ locals {
163
163
module "cbr_rule" {
164
164
count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
165
165
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
166
- version = " 1.29 .0"
166
+ version = " 1.31 .0"
167
167
rule_description = var. cbr_rules [count . index ]. description
168
168
enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
169
169
rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -50,7 +50,7 @@ module "secrets_manager" {
50
50
51
51
| Name | Source | Version |
52
52
| ------| --------| ---------|
53
- | <a name =" module_secret_groups " ></a > [ secret\_ groups] ( #module\_ secret\_ groups ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.2 |
53
+ | <a name =" module_secret_groups " ></a > [ secret\_ groups] ( #module\_ secret\_ groups ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.3 |
54
54
| <a name =" module_secrets " ></a > [ secrets] ( #module\_ secrets ) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.7.0 |
55
55
56
56
### Resources
Original file line number Diff line number Diff line change @@ -25,7 +25,7 @@ data "ibm_sm_secret_groups" "existing_secret_groups" {
25
25
module "secret_groups" {
26
26
for_each = { for obj in local . secret_groups : obj . secret_group_name => obj }
27
27
source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
28
- version = " 1.3.2 "
28
+ version = " 1.3.3 "
29
29
region = var. existing_sm_instance_region
30
30
secrets_manager_guid = var. existing_sm_instance_guid
31
31
secret_group_name = each. value . secret_group_name
Original file line number Diff line number Diff line change @@ -24,10 +24,10 @@ This solution supports the following:
24
24
25
25
| Name | Source | Version |
26
26
| ------| --------| ---------|
27
- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.20 .0 |
27
+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.22 .0 |
28
28
| <a name =" module_kms_instance_crn_parser " ></a > [ kms\_ instance\_ crn\_ parser] ( #module\_ kms\_ instance\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
29
29
| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
30
- | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
30
+ | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
31
31
| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | ../.. | n/a |
32
32
33
33
### Resources
Original file line number Diff line number Diff line change 7
7
8
8
module "resource_group" {
9
9
source = " terraform-ibm-modules/resource-group/ibm"
10
- version = " 1.1.6 "
10
+ version = " 1.2.0 "
11
11
existing_resource_group_name = var. existing_resource_group_name
12
12
}
13
13
@@ -130,7 +130,7 @@ module "kms" {
130
130
}
131
131
count = var. existing_secrets_manager_crn == null && var. kms_encryption_enabled && var. existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
132
132
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
133
- version = " 4.20 .0"
133
+ version = " 4.22 .0"
134
134
create_key_protect_instance = false
135
135
region = local. kms_region
136
136
existing_kms_instance_crn = var. existing_kms_instance_crn
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.6 "
7
+ version = " 1.2.0 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -16,7 +16,7 @@ module "resource_group" {
16
16
17
17
module "event_notifications" {
18
18
source = " terraform-ibm-modules/event-notifications/ibm"
19
- version = " 1.19.4 "
19
+ version = " 1.19.20 "
20
20
resource_group_id = module. resource_group . resource_group_id
21
21
name = " ${ var . prefix } -en"
22
22
tags = var. resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
31
31
32
32
module "key_protect" {
33
33
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
34
- version = " 4.21.3 "
34
+ version = " 4.22.0 "
35
35
key_protect_instance_name = " ${ var . prefix } -key-protect"
36
36
resource_group_id = module. resource_group . resource_group_id
37
37
region = var. region
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.1.6 "
7
+ version = " 1.2.0 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -17,7 +17,7 @@ module "resource_group" {
17
17
module "secrets_manager" {
18
18
count = var. provision_secrets_manager == true ? 1 : 0
19
19
source = " terraform-ibm-modules/secrets-manager/ibm"
20
- version = " 2.1.1 " # Replace "X.X.X" with a release version to lock into a specific release
20
+ version = " 2.2.0 " # Replace "X.X.X" with a release version to lock into a specific release
21
21
resource_group_id = module. resource_group . resource_group_id
22
22
region = var. region
23
23
secrets_manager_name = " ${ var . prefix } -tsm"
You can’t perform that action at this time.
0 commit comments