Skip to content

Commit b3bff4e

Browse files
fix(deps): update dependencies (#901)
1 parent 301e2af commit b3bff4e

File tree

9 files changed

+43
-43
lines changed

9 files changed

+43
-43
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -304,8 +304,8 @@ Optionally, you need the following permissions to attach Access Management tags
304304
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.8.8 |
305305
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.8.8 |
306306
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.8.8 |
307-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.35.1 |
308-
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 10.8.0 |
307+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.35.2 |
308+
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 10.8.1 |
309309
| <a name="module_existing_secrets_manager_instance_parser"></a> [existing\_secrets\_manager\_instance\_parser](#module\_existing\_secrets\_manager\_instance\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.7 |
310310
| <a name="module_worker_pools"></a> [worker\_pools](#module\_worker\_pools) | ./modules/worker-pool | n/a |
311311

examples/advanced/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ locals {
2222

2323
module "kp_all_inclusive" {
2424
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
25-
version = "5.5.11"
25+
version = "5.5.12"
2626
key_protect_instance_name = "${var.prefix}-kp-instance"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region
@@ -240,7 +240,7 @@ locals {
240240

241241
module "cloud_logs" {
242242
source = "terraform-ibm-modules/cloud-logs/ibm"
243-
version = "1.10.11"
243+
version = "1.10.12"
244244
resource_group_id = module.resource_group.resource_group_id
245245
region = var.region
246246
plan = "standard"
@@ -249,7 +249,7 @@ module "cloud_logs" {
249249

250250
module "trusted_profile" {
251251
source = "terraform-ibm-modules/trusted-profile/ibm"
252-
version = "3.2.13"
252+
version = "3.2.14"
253253
trusted_profile_name = "${var.prefix}-profile"
254254
trusted_profile_description = "Logs agent Trusted Profile"
255255
# As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs.

examples/containerized_app_landing_zone/README.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -39,28 +39,28 @@ The primary goal of this example is to provision an OpenShift cluster on VPC and
3939

4040
| Name | Source | Version |
4141
|------|--------|---------|
42-
| <a name="module_activity_tracker"></a> [activity\_tracker](#module\_activity\_tracker) | terraform-ibm-modules/activity-tracker/ibm | 1.5.11 |
42+
| <a name="module_activity_tracker"></a> [activity\_tracker](#module\_activity\_tracker) | terraform-ibm-modules/activity-tracker/ibm | 1.5.12 |
4343
| <a name="module_app_config"></a> [app\_config](#module\_app\_config) | terraform-ibm-modules/app-configuration/ibm | 1.14.4 |
44-
| <a name="module_at_cos_bucket"></a> [at\_cos\_bucket](#module\_at\_cos\_bucket) | terraform-ibm-modules/cos/ibm//modules/buckets | 10.8.0 |
45-
| <a name="module_cloud_logs"></a> [cloud\_logs](#module\_cloud\_logs) | terraform-ibm-modules/cloud-logs/ibm | 1.10.11 |
46-
| <a name="module_cloud_logs_buckets"></a> [cloud\_logs\_buckets](#module\_cloud\_logs\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 10.8.0 |
47-
| <a name="module_cloud_monitoring"></a> [cloud\_monitoring](#module\_cloud\_monitoring) | terraform-ibm-modules/cloud-monitoring/ibm | 1.12.7 |
48-
| <a name="module_cos"></a> [cos](#module\_cos) | terraform-ibm-modules/cos/ibm//modules/fscloud | 10.8.0 |
49-
| <a name="module_en_cos_buckets"></a> [en\_cos\_buckets](#module\_en\_cos\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 10.8.0 |
50-
| <a name="module_event_notifications"></a> [event\_notifications](#module\_event\_notifications) | terraform-ibm-modules/event-notifications/ibm | 2.10.24 |
51-
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.5.11 |
44+
| <a name="module_at_cos_bucket"></a> [at\_cos\_bucket](#module\_at\_cos\_bucket) | terraform-ibm-modules/cos/ibm//modules/buckets | 10.8.1 |
45+
| <a name="module_cloud_logs"></a> [cloud\_logs](#module\_cloud\_logs) | terraform-ibm-modules/cloud-logs/ibm | 1.10.12 |
46+
| <a name="module_cloud_logs_buckets"></a> [cloud\_logs\_buckets](#module\_cloud\_logs\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 10.8.1 |
47+
| <a name="module_cloud_monitoring"></a> [cloud\_monitoring](#module\_cloud\_monitoring) | terraform-ibm-modules/cloud-monitoring/ibm | 1.12.8 |
48+
| <a name="module_cos"></a> [cos](#module\_cos) | terraform-ibm-modules/cos/ibm//modules/fscloud | 10.8.1 |
49+
| <a name="module_en_cos_buckets"></a> [en\_cos\_buckets](#module\_en\_cos\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 10.8.1 |
50+
| <a name="module_event_notifications"></a> [event\_notifications](#module\_event\_notifications) | terraform-ibm-modules/event-notifications/ibm | 2.10.25 |
51+
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.5.12 |
5252
| <a name="module_logs_agent"></a> [logs\_agent](#module\_logs\_agent) | terraform-ibm-modules/logs-agent/ibm | 1.16.0 |
53-
| <a name="module_metrics_routing"></a> [metrics\_routing](#module\_metrics\_routing) | terraform-ibm-modules/cloud-monitoring/ibm//modules/metrics_routing | 1.12.7 |
53+
| <a name="module_metrics_routing"></a> [metrics\_routing](#module\_metrics\_routing) | terraform-ibm-modules/cloud-monitoring/ibm//modules/metrics_routing | 1.12.8 |
5454
| <a name="module_monitoring_agent"></a> [monitoring\_agent](#module\_monitoring\_agent) | terraform-ibm-modules/monitoring-agent/ibm | 1.19.2 |
5555
| <a name="module_ocp_base"></a> [ocp\_base](#module\_ocp\_base) | ../.. | n/a |
5656
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.4.7 |
57-
| <a name="module_scc_wp"></a> [scc\_wp](#module\_scc\_wp) | terraform-ibm-modules/scc-workload-protection/ibm | 1.16.11 |
57+
| <a name="module_scc_wp"></a> [scc\_wp](#module\_scc\_wp) | terraform-ibm-modules/scc-workload-protection/ibm | 1.16.12 |
5858
| <a name="module_secret_group"></a> [secret\_group](#module\_secret\_group) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.33 |
5959
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | terraform-ibm-modules/secrets-manager/ibm | 2.12.10 |
60-
| <a name="module_trusted_profile"></a> [trusted\_profile](#module\_trusted\_profile) | terraform-ibm-modules/trusted-profile/ibm | 3.2.13 |
60+
| <a name="module_trusted_profile"></a> [trusted\_profile](#module\_trusted\_profile) | terraform-ibm-modules/trusted-profile/ibm | 3.2.14 |
6161
| <a name="module_vpc"></a> [vpc](#module\_vpc) | terraform-ibm-modules/landing-zone-vpc/ibm | 8.10.4 |
62-
| <a name="module_vpc_cos_buckets"></a> [vpc\_cos\_buckets](#module\_vpc\_cos\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 10.8.0 |
63-
| <a name="module_vpe_gateway"></a> [vpe\_gateway](#module\_vpe\_gateway) | terraform-ibm-modules/vpe-gateway/ibm | 4.8.12 |
62+
| <a name="module_vpc_cos_buckets"></a> [vpc\_cos\_buckets](#module\_vpc\_cos\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 10.8.1 |
63+
| <a name="module_vpe_gateway"></a> [vpe\_gateway](#module\_vpe\_gateway) | terraform-ibm-modules/vpe-gateway/ibm | 4.8.13 |
6464

6565
### Resources
6666

examples/containerized_app_landing_zone/main.tf

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ locals {
4949

5050
module "kms" {
5151
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
52-
version = "5.5.11"
52+
version = "5.5.12"
5353
resource_group_id = module.resource_group.resource_group_id
5454
region = var.region
5555
create_key_protect_instance = true
@@ -81,7 +81,7 @@ locals {
8181

8282
module "cloud_monitoring" {
8383
source = "terraform-ibm-modules/cloud-monitoring/ibm"
84-
version = "1.12.7"
84+
version = "1.12.8"
8585
resource_group_id = module.resource_group.resource_group_id
8686
region = var.region
8787
instance_name = "${var.prefix}-cloud-monitoring"
@@ -93,7 +93,7 @@ module "cloud_monitoring" {
9393

9494
module "metrics_routing" {
9595
source = "terraform-ibm-modules/cloud-monitoring/ibm//modules/metrics_routing"
96-
version = "1.12.7"
96+
version = "1.12.8"
9797
metrics_router_targets = [
9898
{
9999
destination_crn = module.cloud_monitoring.crn
@@ -117,7 +117,7 @@ locals {
117117

118118
module "event_notifications" {
119119
source = "terraform-ibm-modules/event-notifications/ibm"
120-
version = "2.10.24"
120+
version = "2.10.25"
121121
resource_group_id = module.resource_group.resource_group_id
122122
region = var.region
123123
name = "${var.prefix}-event-notifications"
@@ -165,7 +165,7 @@ locals {
165165

166166
module "en_cos_buckets" {
167167
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
168-
version = "10.8.0"
168+
version = "10.8.1"
169169
bucket_configs = local.en_cos_bucket_config
170170
}
171171

@@ -284,7 +284,7 @@ resource "ibm_en_subscription_email" "en_email_subscription" {
284284

285285
module "cos" {
286286
source = "terraform-ibm-modules/cos/ibm//modules/fscloud"
287-
version = "10.8.0"
287+
version = "10.8.1"
288288
resource_group_id = module.resource_group.resource_group_id
289289
create_cos_instance = true
290290
cos_instance_name = "${var.prefix}-cos-instance"
@@ -323,7 +323,7 @@ locals {
323323
module "cloud_logs" {
324324
depends_on = [time_sleep.wait_for_cos_authorization_policy]
325325
source = "terraform-ibm-modules/cloud-logs/ibm"
326-
version = "1.10.11"
326+
version = "1.10.12"
327327
resource_group_id = module.resource_group.resource_group_id
328328
region = var.region
329329
instance_name = "${var.prefix}-cloud-logs"
@@ -348,7 +348,7 @@ module "cloud_logs" {
348348

349349
module "cloud_logs_buckets" {
350350
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
351-
version = "10.8.0"
351+
version = "10.8.1"
352352
bucket_configs = [
353353
{
354354
bucket_name = local.data_bucket_name
@@ -436,7 +436,7 @@ locals {
436436

437437
module "activity_tracker" {
438438
source = "terraform-ibm-modules/activity-tracker/ibm"
439-
version = "1.5.11"
439+
version = "1.5.12"
440440
cos_targets = [
441441
{
442442
bucket_name = module.at_cos_bucket.buckets[local.activity_tracker_cos_target_bucket_name].bucket_name
@@ -463,7 +463,7 @@ module "activity_tracker" {
463463

464464
module "at_cos_bucket" {
465465
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
466-
version = "10.8.0"
466+
version = "10.8.1"
467467
bucket_configs = [
468468
for value in local.at_buckets_config :
469469
{
@@ -570,7 +570,7 @@ resource "ibm_en_subscription_email" "apprapp_email_subscription" {
570570

571571
module "scc_wp" {
572572
source = "terraform-ibm-modules/scc-workload-protection/ibm"
573-
version = "1.16.11"
573+
version = "1.16.12"
574574
name = "${var.prefix}-scc-workload-protection"
575575
region = var.region
576576
resource_group_id = module.resource_group.resource_group_id
@@ -618,7 +618,7 @@ locals {
618618
# Create COS bucket using the defined bucket configuration
619619
module "vpc_cos_buckets" {
620620
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
621-
version = "10.8.0"
621+
version = "10.8.1"
622622
bucket_configs = local.flow_logs_bucket_config
623623
}
624624

@@ -791,7 +791,7 @@ module "vpc" {
791791

792792
module "vpe_gateway" {
793793
source = "terraform-ibm-modules/vpe-gateway/ibm"
794-
version = "4.8.12"
794+
version = "4.8.13"
795795
resource_group_id = module.resource_group.resource_group_id
796796
region = var.region
797797
prefix = var.prefix
@@ -932,7 +932,7 @@ locals {
932932

933933
module "trusted_profile" {
934934
source = "terraform-ibm-modules/trusted-profile/ibm"
935-
version = "3.2.13"
935+
version = "3.2.14"
936936
trusted_profile_name = "${var.prefix}-profile"
937937
trusted_profile_description = "Logs agent Trusted Profile"
938938
trusted_profile_policies = [{

examples/fscloud/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "cos_fscloud" {
1818
source = "terraform-ibm-modules/cos/ibm"
19-
version = "10.8.0"
19+
version = "10.8.1"
2020
resource_group_id = module.resource_group.resource_group_id
2121
create_cos_bucket = false
2222
cos_instance_name = "${var.prefix}-cos"
@@ -30,7 +30,7 @@ module "cos_fscloud" {
3030

3131
module "flowlogs_bucket" {
3232
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
33-
version = "10.8.0"
33+
version = "10.8.1"
3434

3535
bucket_configs = [
3636
{
@@ -112,7 +112,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
112112

113113
module "cbr_vpc_zone" {
114114
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
115-
version = "1.35.1"
115+
version = "1.35.2"
116116
name = "${var.prefix}-VPC-network-zone"
117117
zone_description = "CBR Network zone representing VPC"
118118
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -124,7 +124,7 @@ module "cbr_vpc_zone" {
124124

125125
module "cbr_zone_schematics" {
126126
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
127-
version = "1.35.1"
127+
version = "1.35.2"
128128
name = "${var.prefix}-schematics-zone"
129129
zone_description = "CBR Network zone containing Schematics"
130130
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -139,7 +139,7 @@ module "cbr_zone_schematics" {
139139

140140
module "cbr_rules" {
141141
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
142-
version = "1.35.1"
142+
version = "1.35.2"
143143
rule_description = "${var.prefix} rule for vpc flow log access to cos"
144144
enforcement_mode = "enabled"
145145
resources = [{

examples/multiple_mzr_clusters/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ data "ibm_container_cluster_config" "cluster_config_c2" {
176176

177177
module "monitoring_instance" {
178178
source = "terraform-ibm-modules/cloud-monitoring/ibm"
179-
version = "1.12.7"
179+
version = "1.12.8"
180180
resource_group_id = module.resource_group.resource_group_id
181181
region = var.region
182182
plan = "graduated-tier"

main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ module "cos_instance" {
126126
count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0
127127

128128
source = "terraform-ibm-modules/cos/ibm"
129-
version = "10.8.0"
129+
version = "10.8.1"
130130
cos_instance_name = local.cos_name
131131
resource_group_id = var.resource_group_id
132132
cos_plan = local.cos_plan
@@ -732,7 +732,7 @@ locals {
732732
module "cbr_rule" {
733733
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
734734
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
735-
version = "1.35.1"
735+
version = "1.35.2"
736736
rule_description = var.cbr_rules[count.index].description
737737
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
738738
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ module "kms" {
9595
}
9696
count = (var.kms_encryption_enabled_boot_volume && var.existing_boot_volume_kms_key_crn == null) || (var.kms_encryption_enabled_cluster && var.existing_cluster_kms_key_crn == null) ? 1 : 0
9797
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
98-
version = "5.5.11"
98+
version = "5.5.12"
9999
create_key_protect_instance = false
100100
region = local.cluster_kms_region
101101
existing_kms_instance_crn = var.existing_kms_instance_crn

tests/existing-resources/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ module "vpc" {
5454

5555
module "cos" {
5656
source = "terraform-ibm-modules/cos/ibm"
57-
version = "10.8.0"
57+
version = "10.8.1"
5858
resource_group_id = module.resource_group.resource_group_id
5959
region = var.region
6060
cos_instance_name = "${var.prefix}-cos"

0 commit comments

Comments
 (0)