File tree Expand file tree Collapse file tree 9 files changed +13
-13
lines changed
secure-cross-regional-bucket Expand file tree Collapse file tree 9 files changed +13
-13
lines changed Original file line number Diff line number Diff line change @@ -137,8 +137,8 @@ You need the following permissions to run this module.
137
137
138
138
| Name | Source | Version |
139
139
| ------| --------| ---------|
140
- | <a name =" module_bucket_cbr_rule " ></a > [ bucket\_ cbr\_ rule] ( #module\_ bucket\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30 .0 |
141
- | <a name =" module_instance_cbr_rule " ></a > [ instance\_ cbr\_ rule] ( #module\_ instance\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30 .0 |
140
+ | <a name =" module_bucket_cbr_rule " ></a > [ bucket\_ cbr\_ rule] ( #module\_ bucket\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31 .0 |
141
+ | <a name =" module_instance_cbr_rule " ></a > [ instance\_ cbr\_ rule] ( #module\_ instance\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31 .0 |
142
142
143
143
### Resources
144
144
Original file line number Diff line number Diff line change @@ -50,7 +50,7 @@ locals {
50
50
51
51
module "key_protect_all_inclusive" {
52
52
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
53
- version = " 5.0.0 "
53
+ version = " 5.0.1 "
54
54
key_protect_instance_name = " ${ var . prefix } -kp"
55
55
resource_group_id = module. resource_group . resource_group_id
56
56
enable_metrics = false
@@ -81,7 +81,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
81
81
82
82
module "cbr_zone" {
83
83
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
84
- version = " 1.30 .0"
84
+ version = " 1.31 .0"
85
85
name = " ${ var . prefix } -VPC-network-zone"
86
86
zone_description = " CBR Network zone containing VPC"
87
87
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -41,7 +41,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
41
41
42
42
module "cbr_zone" {
43
43
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
44
- version = " 1.30 .0"
44
+ version = " 1.31 .0"
45
45
name = " ${ var . prefix } -VPC-fscloud-nz"
46
46
zone_description = " CBR Network zone containing VPC"
47
47
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
@@ -54,7 +54,7 @@ module "cbr_zone" {
54
54
# Allow schematics, from outside VPC, to manage resources
55
55
module "cbr_zone_schematics" {
56
56
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
57
- version = " 1.30 .0"
57
+ version = " 1.31 .0"
58
58
name = " ${ var . prefix } -schematics-fscloud-nz"
59
59
zone_description = " CBR Network zone containing Schematics"
60
60
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -358,7 +358,7 @@ locals {
358
358
module "bucket_cbr_rule" {
359
359
count = (length (var. bucket_cbr_rules ) > 0 && var. create_cos_bucket ) ? length (var. bucket_cbr_rules ) : 0
360
360
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
361
- version = " 1.30 .0"
361
+ version = " 1.31 .0"
362
362
rule_description = var. bucket_cbr_rules [count . index ]. description
363
363
enforcement_mode = var. bucket_cbr_rules [count . index ]. enforcement_mode
364
364
rule_contexts = var. bucket_cbr_rules [count . index ]. rule_contexts
@@ -393,7 +393,7 @@ module "bucket_cbr_rule" {
393
393
module "instance_cbr_rule" {
394
394
count = length (var. instance_cbr_rules )
395
395
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
396
- version = " 1.30 .0"
396
+ version = " 1.31 .0"
397
397
rule_description = var. instance_cbr_rules [count . index ]. description
398
398
enforcement_mode = var. instance_cbr_rules [count . index ]. enforcement_mode
399
399
rule_contexts = var. instance_cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -94,7 +94,7 @@ module "cos_fscloud" {
94
94
| ------| --------| ---------|
95
95
| <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | ../../modules/buckets | n/a |
96
96
| <a name =" module_cos_instance " ></a > [ cos\_ instance] ( #module\_ cos\_ instance ) | ../../ | n/a |
97
- | <a name =" module_instance_cbr_rules " ></a > [ instance\_ cbr\_ rules] ( #module\_ instance\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30 .0 |
97
+ | <a name =" module_instance_cbr_rules " ></a > [ instance\_ cbr\_ rules] ( #module\_ instance\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31 .0 |
98
98
99
99
### Resources
100
100
Original file line number Diff line number Diff line change @@ -89,7 +89,7 @@ module "instance_cbr_rules" {
89
89
depends_on = [module . buckets ]
90
90
count = length (var. instance_cbr_rules )
91
91
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
92
- version = " 1.30 .0"
92
+ version = " 1.31 .0"
93
93
rule_description = var. instance_cbr_rules [count . index ]. description
94
94
enforcement_mode = var. instance_cbr_rules [count . index ]. enforcement_mode
95
95
rule_contexts = var. instance_cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -69,7 +69,7 @@ module "secrets_manager_service_credentials" {
69
69
count = length (local. service_credential_secrets ) > 0 ? 1 : 0
70
70
depends_on = [time_sleep . wait_for_cos_authorization_policy ]
71
71
source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
72
- version = " 2.1.1 "
72
+ version = " 2.2.0 "
73
73
existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
74
74
existing_sm_instance_region = local. existing_secrets_manager_instance_region
75
75
endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -127,7 +127,7 @@ module "kms" {
127
127
}
128
128
count = var. existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key.
129
129
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
130
- version = " 5.0.0 "
130
+ version = " 5.0.1 "
131
131
create_key_protect_instance = false
132
132
region = local. existing_kms_instance_region
133
133
existing_kms_instance_crn = var. existing_kms_instance_crn
Original file line number Diff line number Diff line change @@ -129,7 +129,7 @@ module "kms" {
129
129
}
130
130
count = var. existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key
131
131
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
132
- version = " 5.0.0 "
132
+ version = " 5.0.1 "
133
133
create_key_protect_instance = false
134
134
region = local. existing_kms_instance_region
135
135
existing_kms_instance_crn = var. existing_kms_instance_crn
You can’t perform that action at this time.
0 commit comments