File tree Expand file tree Collapse file tree 12 files changed +26
-26
lines changed
cross-regional-bucket/fully-configurable
regional-bucket/fully-configurable Expand file tree Collapse file tree 12 files changed +26
-26
lines changed Original file line number Diff line number Diff line change @@ -130,8 +130,8 @@ You need the following permissions to run this module.
130
130
131
131
| Name | Source | Version |
132
132
| ------| --------| ---------|
133
- | <a name =" module_bucket_cbr_rule " ></a > [ bucket\_ cbr\_ rule] ( #module\_ bucket\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
134
- | <a name =" module_instance_cbr_rule " ></a > [ instance\_ cbr\_ rule] ( #module\_ instance\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
133
+ | <a name =" module_bucket_cbr_rule " ></a > [ bucket\_ cbr\_ rule] ( #module\_ bucket\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.2 |
134
+ | <a name =" module_instance_cbr_rule " ></a > [ instance\_ cbr\_ rule] ( #module\_ instance\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.2 |
135
135
136
136
### Resources
137
137
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -50,7 +50,7 @@ locals {
50
50
51
51
module "key_protect_all_inclusive" {
52
52
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
53
- version = " 5.1.7 "
53
+ version = " 5.1.9 "
54
54
key_protect_instance_name = " ${ var . prefix } -kp"
55
55
resource_group_id = module. resource_group . resource_group_id
56
56
enable_metrics = false
@@ -81,7 +81,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
81
81
82
82
module "cbr_zone" {
83
83
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
84
- version = " 1.31.0 "
84
+ version = " 1.32.2 "
85
85
name = " ${ var . prefix } -VPC-network-zone"
86
86
zone_description = " CBR Network zone containing VPC"
87
87
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -41,7 +41,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
41
41
42
42
module "cbr_zone" {
43
43
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
44
- version = " 1.31.0 "
44
+ version = " 1.32.2 "
45
45
name = " ${ var . prefix } -VPC-fscloud-nz"
46
46
zone_description = " CBR Network zone containing VPC"
47
47
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
@@ -54,7 +54,7 @@ module "cbr_zone" {
54
54
# Allow schematics, from outside VPC, to manage resources
55
55
module "cbr_zone_schematics" {
56
56
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
57
- version = " 1.31.0 "
57
+ version = " 1.32.2 "
58
58
name = " ${ var . prefix } -schematics-fscloud-nz"
59
59
zone_description = " CBR Network zone containing Schematics"
60
60
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change @@ -358,7 +358,7 @@ locals {
358
358
module "bucket_cbr_rule" {
359
359
count = (length (var. bucket_cbr_rules ) > 0 && var. create_cos_bucket ) ? length (var. bucket_cbr_rules ) : 0
360
360
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
361
- version = " 1.31.0 "
361
+ version = " 1.32.2 "
362
362
rule_description = var. bucket_cbr_rules [count . index ]. description
363
363
enforcement_mode = var. bucket_cbr_rules [count . index ]. enforcement_mode
364
364
rule_contexts = var. bucket_cbr_rules [count . index ]. rule_contexts
@@ -393,7 +393,7 @@ module "bucket_cbr_rule" {
393
393
module "instance_cbr_rule" {
394
394
count = length (var. instance_cbr_rules )
395
395
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
396
- version = " 1.31.0 "
396
+ version = " 1.32.2 "
397
397
rule_description = var. instance_cbr_rules [count . index ]. description
398
398
enforcement_mode = var. instance_cbr_rules [count . index ]. enforcement_mode
399
399
rule_contexts = var. instance_cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -94,7 +94,7 @@ module "cos_fscloud" {
94
94
| ------| --------| ---------|
95
95
| <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | ../../modules/buckets | n/a |
96
96
| <a name =" module_cos_instance " ></a > [ cos\_ instance] ( #module\_ cos\_ instance ) | ../../ | n/a |
97
- | <a name =" module_instance_cbr_rules " ></a > [ instance\_ cbr\_ rules] ( #module\_ instance\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
97
+ | <a name =" module_instance_cbr_rules " ></a > [ instance\_ cbr\_ rules] ( #module\_ instance\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.2 |
98
98
99
99
### Resources
100
100
Original file line number Diff line number Diff line change @@ -89,7 +89,7 @@ module "instance_cbr_rules" {
89
89
depends_on = [module . buckets ]
90
90
count = length (var. instance_cbr_rules )
91
91
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
92
- version = " 1.31.0 "
92
+ version = " 1.32.2 "
93
93
rule_description = var. instance_cbr_rules [count . index ]. description
94
94
enforcement_mode = var. instance_cbr_rules [count . index ]. enforcement_mode
95
95
rule_contexts = var. instance_cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -62,7 +62,7 @@ locals {
62
62
63
63
module "cos_instance_crn_parser" {
64
64
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
65
- version = " 1.1 .0"
65
+ version = " 1.2 .0"
66
66
crn = var. existing_cos_instance_crn
67
67
}
68
68
@@ -94,14 +94,14 @@ locals {
94
94
module "kms_instance_crn_parser" {
95
95
count = var. existing_kms_instance_crn != null ? 1 : 0
96
96
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
97
- version = " 1.1 .0"
97
+ version = " 1.2 .0"
98
98
crn = var. existing_kms_instance_crn
99
99
}
100
100
101
101
module "kms_key_crn_parser" {
102
102
count = var. existing_kms_key_crn != null ? 1 : 0
103
103
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
104
- version = " 1.1 .0"
104
+ version = " 1.2 .0"
105
105
crn = var. existing_kms_key_crn
106
106
}
107
107
@@ -158,7 +158,7 @@ module "kms" {
158
158
}
159
159
count = var. kms_encryption_enabled && var. existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key.
160
160
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
161
- version = " 5.1.7 "
161
+ version = " 5.1.9 "
162
162
create_key_protect_instance = false
163
163
region = local. kms_region
164
164
existing_kms_instance_crn = var. existing_kms_instance_crn
You can’t perform that action at this time.
0 commit comments