@@ -14,21 +14,21 @@ module "resource_group" {
1414module "existing_kms_crn_parser" {
1515 count = var. existing_kms_instance_crn != null ? 1 : 0
1616 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
17- version = " 1.2 .0"
17+ version = " 1.3 .0"
1818 crn = var. existing_kms_instance_crn
1919}
2020
2121module "existing_cluster_kms_key_crn_parser" {
2222 count = var. existing_cluster_kms_key_crn != null ? 1 : 0
2323 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
24- version = " 1.2 .0"
24+ version = " 1.3 .0"
2525 crn = var. existing_cluster_kms_key_crn
2626}
2727
2828module "existing_boot_volume_kms_key_crn_parser" {
2929 count = var. existing_boot_volume_kms_key_crn != null ? 1 : 0
3030 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
31- version = " 1.2 .0"
31+ version = " 1.3 .0"
3232 crn = var. existing_boot_volume_kms_key_crn
3333}
3434
@@ -95,7 +95,7 @@ module "kms" {
9595 }
9696 count = (var. kms_encryption_enabled_boot_volume && var. existing_boot_volume_kms_key_crn == null ) || (var. kms_encryption_enabled_cluster && var. existing_cluster_kms_key_crn == null ) ? 1 : 0
9797 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
98- version = " 5.4.5 "
98+ version = " 5.4.10 "
9999 create_key_protect_instance = false
100100 region = local. cluster_kms_region
101101 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -109,7 +109,7 @@ module "kms" {
109109# #######################################################################################################################
110110module "existing_vpc_crn_parser" {
111111 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
112- version = " 1.2 .0"
112+ version = " 1.3 .0"
113113 crn = var. existing_vpc_crn
114114}
115115
@@ -244,7 +244,7 @@ module "ocp_base" {
244244module "existing_secrets_manager_instance_parser" {
245245 count = var. enable_secrets_manager_integration ? 1 : 0
246246 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
247- version = " 1.2 .0"
247+ version = " 1.3 .0"
248248 crn = var. existing_secrets_manager_instance_crn
249249}
250250
@@ -279,7 +279,7 @@ module "secret_group" {
279279 }
280280 count = var. enable_secrets_manager_integration && var. secrets_manager_secret_group_id == null ? 1 : 0
281281 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
282- version = " 1.3.15 "
282+ version = " 1.3.17 "
283283 region = module. existing_secrets_manager_instance_parser [0 ]. region
284284 secrets_manager_guid = module. existing_secrets_manager_instance_parser [0 ]. service_instance
285285 secret_group_name = module. ocp_base . cluster_id
0 commit comments