Skip to content

Commit d8cf80d

Browse files
fix(deps): update terraform-module (#317)
1 parent 6a2b6fa commit d8cf80d

File tree

12 files changed

+23
-23
lines changed

12 files changed

+23
-23
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ You need the following permissions to run this module.
7575

7676
| Name | Source | Version |
7777
|------|--------|---------|
78-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.29.0 |
78+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
7979
| <a name="module_kms_key_crn_parser"></a> [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
8080
| <a name="module_secrets"></a> [secrets](#module\_secrets) | ./modules/secrets | n/a |
8181

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "resource_group" {
22
source = "terraform-ibm-modules/resource-group/ibm"
3-
version = "1.1.6"
3+
version = "1.2.0"
44
# if an existing resource group is not set (null) create a new one using prefix
55
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
66
existing_resource_group_name = var.resource_group

examples/complete/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ This examples handles the provisioning of a new Secrets Manager instance.
1515

1616
| Name | Source | Version |
1717
|------|--------|---------|
18-
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.19.4 |
19-
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.21.3 |
20-
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
18+
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.19.20 |
19+
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.22.0 |
20+
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
2121
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
2222

2323
### Resources

examples/complete/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
module "resource_group" {
22
source = "terraform-ibm-modules/resource-group/ibm"
3-
version = "1.1.6"
3+
version = "1.2.0"
44
# if an existing resource group is not set (null) create a new one using prefix
55
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
66
existing_resource_group_name = var.resource_group
77
}
88

99
module "key_protect" {
1010
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
11-
version = "4.21.3"
11+
version = "4.22.0"
1212
key_protect_instance_name = "${var.prefix}-key-protect"
1313
resource_group_id = module.resource_group.resource_group_id
1414
region = var.region
@@ -27,7 +27,7 @@ module "key_protect" {
2727

2828
module "event_notification" {
2929
source = "terraform-ibm-modules/event-notifications/ibm"
30-
version = "1.19.4"
30+
version = "1.19.20"
3131
resource_group_id = module.resource_group.resource_group_id
3232
name = "${var.prefix}-en"
3333
tags = var.resource_tags

examples/fscloud/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
##############################################################################
44
module "resource_group" {
55
source = "terraform-ibm-modules/resource-group/ibm"
6-
version = "1.1.6"
6+
version = "1.2.0"
77
# if an existing resource group is not set (null) create a new one using prefix
88
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
99
existing_resource_group_name = var.resource_group
@@ -30,7 +30,7 @@ resource "ibm_is_vpc" "vpc" {
3030
##############################################################################
3131
module "cbr_zone" {
3232
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
33-
version = "1.29.0"
33+
version = "1.31.0"
3434
name = "${var.prefix}-CBR-zone"
3535
zone_description = "CBR Network zone representing VPC"
3636
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -42,7 +42,7 @@ module "cbr_zone" {
4242

4343
module "event_notification" {
4444
source = "terraform-ibm-modules/event-notifications/ibm"
45-
version = "1.19.4"
45+
version = "1.19.20"
4646
resource_group_id = module.resource_group.resource_group_id
4747
name = "${var.prefix}-en"
4848
tags = var.resource_tags

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ locals {
163163
module "cbr_rule" {
164164
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
165165
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
166-
version = "1.29.0"
166+
version = "1.31.0"
167167
rule_description = var.cbr_rules[count.index].description
168168
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
169169
rule_contexts = var.cbr_rules[count.index].rule_contexts

modules/secrets/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ module "secrets_manager" {
5050

5151
| Name | Source | Version |
5252
|------|--------|---------|
53-
| <a name="module_secret_groups"></a> [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.2 |
53+
| <a name="module_secret_groups"></a> [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.3 |
5454
| <a name="module_secrets"></a> [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.7.0 |
5555

5656
### Resources

modules/secrets/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ data "ibm_sm_secret_groups" "existing_secret_groups" {
2525
module "secret_groups" {
2626
for_each = { for obj in local.secret_groups : obj.secret_group_name => obj }
2727
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
28-
version = "1.3.2"
28+
version = "1.3.3"
2929
region = var.existing_sm_instance_region
3030
secrets_manager_guid = var.existing_sm_instance_guid
3131
secret_group_name = each.value.secret_group_name

solutions/fully-configurable/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,10 @@ This solution supports the following:
2424

2525
| Name | Source | Version |
2626
|------|--------|---------|
27-
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.20.0 |
27+
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.22.0 |
2828
| <a name="module_kms_instance_crn_parser"></a> [kms\_instance\_crn\_parser](#module\_kms\_instance\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
2929
| <a name="module_kms_key_crn_parser"></a> [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
30-
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
30+
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
3131
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
3232

3333
### Resources

solutions/fully-configurable/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ locals {
77

88
module "resource_group" {
99
source = "terraform-ibm-modules/resource-group/ibm"
10-
version = "1.1.6"
10+
version = "1.2.0"
1111
existing_resource_group_name = var.existing_resource_group_name
1212
}
1313

@@ -130,7 +130,7 @@ module "kms" {
130130
}
131131
count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
132132
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
133-
version = "4.20.0"
133+
version = "4.22.0"
134134
create_key_protect_instance = false
135135
region = local.kms_region
136136
existing_kms_instance_crn = var.existing_kms_instance_crn

tests/existing-resources/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.1.6"
7+
version = "1.2.0"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "event_notifications" {
1818
source = "terraform-ibm-modules/event-notifications/ibm"
19-
version = "1.19.4"
19+
version = "1.19.20"
2020
resource_group_id = module.resource_group.resource_group_id
2121
name = "${var.prefix}-en"
2222
tags = var.resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
3131

3232
module "key_protect" {
3333
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
34-
version = "4.21.3"
34+
version = "4.22.0"
3535
key_protect_instance_name = "${var.prefix}-key-protect"
3636
resource_group_id = module.resource_group.resource_group_id
3737
region = var.region

tests/new-resources/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.1.6"
7+
version = "1.2.0"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -17,7 +17,7 @@ module "resource_group" {
1717
module "secrets_manager" {
1818
count = var.provision_secrets_manager == true ? 1 : 0
1919
source = "terraform-ibm-modules/secrets-manager/ibm"
20-
version = "2.1.1" # Replace "X.X.X" with a release version to lock into a specific release
20+
version = "2.2.0" # Replace "X.X.X" with a release version to lock into a specific release
2121
resource_group_id = module.resource_group.resource_group_id
2222
region = var.region
2323
secrets_manager_name = "${var.prefix}-tsm"

0 commit comments

Comments
 (0)