File tree Expand file tree Collapse file tree 14 files changed +85
-87
lines changed
Expand file tree Collapse file tree 14 files changed +85
-87
lines changed Original file line number Diff line number Diff line change 88
99jobs :
1010 call-terraform-ci-pipeline :
11- uses :
terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected] .0 11+ uses :
terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected] .1 1212 secrets : inherit
Original file line number Diff line number Diff line change 88
99jobs :
1010 call-terraform-release-pipeline :
11- uses : terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.23.2
11+ uses : terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.24.1
1212 secrets : inherit
Original file line number Diff line number Diff line change @@ -113,9 +113,9 @@ You need the following permissions to run this module.
113113
114114| Name | Source | Version |
115115| ------| --------| ---------|
116- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.8 |
117- | <a name =" module_es_guid_crn_parser " ></a > [ es\_ guid\_ crn\_ parser] ( #module\_ es\_ guid\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.0 |
118- | <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.0 |
116+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.34.0 |
117+ | <a name =" module_es_guid_crn_parser " ></a > [ es\_ guid\_ crn\_ parser] ( #module\_ es\_ guid\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.7 |
118+ | <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.7 |
119119
120120### Resources
121121
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.4.0 "
7+ version = " 1.4.7 "
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.4.0 "
7+ version = " 1.4.7 "
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 33# #############################################################################
44
55module "resource_group" {
6- source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.4.0 "
6+ source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.4.7 "
77 # if an existing resource group is not set (null) create a new one using prefix
88 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
99 existing_resource_group_name = var. resource_group
@@ -38,7 +38,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3838# #############################################################################
3939module "cbr_vpc_zone" {
4040 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
41- version = " 1.33.8 "
41+ version = " 1.34.0 "
4242 name = " ${ var . prefix } -VPC-network-zone"
4343 zone_description = " CBR Network zone representing VPC"
4444 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
@@ -50,7 +50,7 @@ module "cbr_vpc_zone" {
5050
5151module "cbr_zone_schematics" {
5252 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
53- version = " 1.33.8 "
53+ version = " 1.34.0 "
5454 name = " ${ var . prefix } -schematics-zone"
5555 zone_description = " CBR Network zone containing Schematics"
5656 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -58,7 +58,7 @@ resource "ibm_resource_instance" "es_instance" {
5858module "kms_key_crn_parser" {
5959 count = var. kms_encryption_enabled == true ? 1 : 0
6060 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
61- version = " 1.3.0 "
61+ version = " 1.3.7 "
6262 crn = var. kms_key_crn
6363}
6464
@@ -171,7 +171,7 @@ resource "time_sleep" "wait_for_kms_authorization_policy" {
171171module "es_guid_crn_parser" {
172172 count = var. mirroring != null ? 1 : 0
173173 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
174- version = " 1.3.0 "
174+ version = " 1.3.7 "
175175 crn = var. mirroring . source_crn
176176}
177177
@@ -200,7 +200,7 @@ resource "time_sleep" "wait_for_es_s2s_policy" {
200200module "cbr_rule" {
201201 count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
202202 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
203- version = " 1.33.8 "
203+ version = " 1.34.0 "
204204 rule_description = var. cbr_rules [count . index ]. description
205205 enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
206206 rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change 77
88module "resource_group" {
99 source = " terraform-ibm-modules/resource-group/ibm"
10- version = " 1.4.0 "
10+ version = " 1.4.7 "
1111 existing_resource_group_name = var. existing_resource_group_name
1212}
1313
@@ -38,7 +38,7 @@ module "event_streams" {
3838module "existing_sm_crn_parser" {
3939 count = var. existing_secrets_manager_instance_crn != null ? 1 : 0
4040 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
41- version = " 1.3.0 "
41+ version = " 1.3.7 "
4242 crn = var. existing_secrets_manager_instance_crn
4343}
4444
@@ -92,7 +92,7 @@ module "secrets_manager_service_credentials" {
9292 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
9393 depends_on = [time_sleep . wait_for_en_authorization_policy ]
9494 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
95- version = " 2.11 .8"
95+ version = " 2.12 .8"
9696 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
9797 existing_sm_instance_region = local. existing_secrets_manager_instance_region
9898 endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -4,7 +4,7 @@ terraform {
44 required_providers {
55 ibm = {
66 source = " IBM-Cloud/ibm"
7- version = " 1.84.3 "
7+ version = " 1.86.1 "
88 }
99 time = {
1010 source = " hashicorp/time"
You can’t perform that action at this time.
0 commit comments