44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.3 .0"
7+ version = " 1.4 .0"
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
@@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "key_protect" {
1818 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
19- version = " 5.3.4 "
19+ version = " 5.4.5 "
2020 key_protect_instance_name = " ${ var . prefix } -key-protect"
2121 resource_group_id = module. resource_group . resource_group_id
2222 region = var. region
@@ -39,7 +39,7 @@ module "key_protect" {
3939
4040module "event_notifications" {
4141 source = " terraform-ibm-modules/event-notifications/ibm"
42- version = " 2.9.3 "
42+ version = " 2.10.5 "
4343 resource_group_id = module. resource_group . resource_group_id
4444 name = " ${ var . prefix } -en"
4545 tags = var. resource_tags
@@ -124,7 +124,7 @@ module "secrets_manager" {
124124# Create new code engine project
125125module "code_engine_project" {
126126 source = " terraform-ibm-modules/code-engine/ibm//modules/project"
127- version = " 4.6.3 "
127+ version = " 4.6.9 "
128128 name = " ${ var . prefix } -project"
129129 resource_group_id = module. resource_group . resource_group_id
130130}
@@ -137,7 +137,7 @@ locals {
137137
138138module "code_engine_secret" {
139139 source = " terraform-ibm-modules/code-engine/ibm//modules/secret"
140- version = " 4.6.3 "
140+ version = " 4.6.9 "
141141 name = " ${ var . prefix } -rs"
142142 project_id = module. code_engine_project . id
143143 format = " registry"
@@ -157,7 +157,7 @@ resource "ibm_cr_namespace" "rg_namespace" {
157157# Build example Go application in Code Engine project which dynamically generates User IBM Cloud IAM API Keys
158158module "code_engine_build" {
159159 source = " terraform-ibm-modules/code-engine/ibm//modules/build"
160- version = " 4.6.3 "
160+ version = " 4.6.9 "
161161 name = " ${ var . prefix } -build"
162162 region = var. region
163163 ibmcloud_api_key = var. ibmcloud_api_key
@@ -186,7 +186,7 @@ locals {
186186module "code_engine_job" {
187187 depends_on = [module . code_engine_build ]
188188 source = " terraform-ibm-modules/code-engine/ibm//modules/job"
189- version = " 4.6.3 "
189+ version = " 4.6.9 "
190190 name = " ${ var . prefix } -job"
191191 image_reference = local. output_image
192192 image_secret = module. code_engine_secret . name
@@ -207,7 +207,7 @@ module "code_engine_job" {
207207module "custom_credential_engine" {
208208 depends_on = [module . secrets_manager , module . code_engine_job ]
209209 source = " terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm"
210- version = " 1.0.4 "
210+ version = " 1.0.6 "
211211 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
212212 secrets_manager_region = module. secrets_manager . secrets_manager_region
213213 custom_credential_engine_name = " ${ var . prefix } -test-custom-engine"
@@ -229,7 +229,7 @@ module "custom_credential_engine" {
229229module "secret_manager_custom_credential" {
230230 depends_on = [module . secrets_manager , module . custom_credential_engine ]
231231 source = " terraform-ibm-modules/secrets-manager-secret/ibm"
232- version = " 1.9.0 "
232+ version = " 1.9.1 "
233233 secret_type = " custom_credentials" # checkov:skip=CKV_SECRET_6
234234 region = module. secrets_manager . secrets_manager_region
235235 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
0 commit comments