File tree Expand file tree Collapse file tree 7 files changed +13
-13
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 7 files changed +13
-13
lines changed Original file line number Diff line number Diff line change @@ -21,7 +21,7 @@ locals {
2121
2222module "key_protect_all_inclusive" {
2323 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
24- version = " 5.1.24 "
24+ version = " 5.1.26 "
2525 resource_group_id = module. resource_group . resource_group_id
2626 region = var. region
2727 key_protect_instance_name = " ${ var . prefix } -kp"
@@ -45,7 +45,7 @@ locals {
4545
4646module "cos" {
4747 source = " terraform-ibm-modules/cos/ibm"
48- version = " 10.2.17 "
48+ version = " 10.2.19 "
4949 resource_group_id = module. resource_group . resource_group_id
5050 region = var. region
5151 cos_instance_name = " ${ var . prefix } -cos"
Original file line number Diff line number Diff line change @@ -77,7 +77,7 @@ locals {
7777
7878module "cos" {
7979 source = " terraform-ibm-modules/cos/ibm//modules/fscloud"
80- version = " 10.2.17 "
80+ version = " 10.2.19 "
8181 resource_group_id = module. resource_group . resource_group_id
8282 create_cos_instance = true
8383 cos_instance_name = " ${ var . prefix } -cos"
Original file line number Diff line number Diff line change @@ -63,7 +63,7 @@ module "kms" {
6363 }
6464 count = local. create_kms_keys ? 1 : 0
6565 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
66- version = " 5.1.24 "
66+ version = " 5.1.26 "
6767 create_key_protect_instance = false
6868 region = local. kms_region
6969 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -236,7 +236,7 @@ locals {
236236module "cos_buckets" {
237237 count = var. enable_collecting_failed_events && var. existing_event_notifications_instance_crn == null ? 1 : 0
238238 source = " terraform-ibm-modules/cos/ibm//modules/buckets"
239- version = " 10.2.17 "
239+ version = " 10.2.19 "
240240 bucket_configs = local. bucket_config
241241}
242242
@@ -357,7 +357,7 @@ module "secrets_manager_service_credentials" {
357357 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
358358 depends_on = [time_sleep . wait_for_en_authorization_policy ]
359359 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
360- version = " 2.8.10 "
360+ version = " 2.9.1 "
361361 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
362362 existing_sm_instance_region = local. existing_secrets_manager_instance_region
363363 endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -18,7 +18,7 @@ module "event_notification" {
1818
1919module "cos" {
2020 source = " terraform-ibm-modules/cos/ibm"
21- version = " 10.2.17 "
21+ version = " 10.2.19 "
2222 resource_group_id = module. resource_group . resource_group_id
2323 region = var. region
2424 cos_instance_name = " ${ var . prefix } -cos"
@@ -30,7 +30,7 @@ module "cos" {
3030
3131module "cloud_monitoring" {
3232 source = " terraform-ibm-modules/cloud-monitoring/ibm"
33- version = " 1.6.9 "
33+ version = " 1.7.1 "
3434 resource_group_id = module. resource_group . resource_group_id
3535 region = var. region
3636 resource_tags = var. resource_tags
@@ -39,7 +39,7 @@ module "cloud_monitoring" {
3939
4040module "kms_key" {
4141 source = " terraform-ibm-modules/kms-key/ibm"
42- version = " 1.4.1 "
42+ version = " 1.4.2 "
4343 kms_instance_id = " crn:v1:bluemix:public:hs-crypto:us-south:a/abac0df06b644a9cabc6e44f55b3880e:e6dce284-e80f-46e1-a3c1-830f7adff7a9::"
4444 key_name = " ${ var . prefix } -root-key"
4545 force_delete = true # Setting it to true for testing purpose
Original file line number Diff line number Diff line change @@ -7,7 +7,7 @@ toolchain go1.25.1
77require (
88 github.com/gruntwork-io/terratest v0.50.0
99 github.com/stretchr/testify v1.11.1
10- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.5
10+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6
1111)
1212
1313require (
Original file line number Diff line number Diff line change @@ -295,8 +295,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
295295github.com/stretchr/testify v1.8.2 /go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4 =
296296github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U =
297297github.com/stretchr/testify v1.11.1 /go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U =
298- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.5 h1:cFfi7TX7WY67sWdgIvOygAb5U1gwXMXNwhhjS61Ysxw =
299- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.5 /go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE =
298+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 h1:Tr7AlrQ+s1Nc9VOwB+It8sItnDOXhfXTxKqI2KtdyFA =
299+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 /go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE =
300300github.com/tidwall/pretty v1.0.0 /go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk =
301301github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw =
302302github.com/tmccombs/hcl2json v0.6.4 /go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk =
You can’t perform that action at this time.
0 commit comments