fix(deps): update terraform-module #382
Open
+3
−3
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.19.8
->4.21.2
1.22.0
->1.25.1
Release Notes
terraform-ibm-modules/terraform-ibm-kms-all-inclusive (terraform-ibm-modules/kms-all-inclusive/ibm)
v4.21.2
Compare Source
Bug Fixes
v4.21.1
Compare Source
Bug Fixes
v4.21.0
Compare Source
Features
cross-region-resiliency
Key Protect instance plan.- updated the
keys
input to support kmip configuration. This input is now marked as a sensitive input since it can contain a private certificate value. (#620) (3a93855)v4.20.0
Compare Source
Features
(#624) (115f845)
resource_tags
->key_protect_resource_tags
access_tags
->key_protect_access_tags
cbr_rules
->key_protect_instance_cbr_rules
key_protect_instance_name
has changed frombase-security-services-kms
->key-protect
terraform-ibm-modules/terraform-ibm-secrets-manager (terraform-ibm-modules/secrets-manager/ibm)
v1.25.1
Compare Source
Bug Fixes
1.76.0
(#303) (190d59d)v1.25.0
Compare Source
Features
skip_iam_authorization_policy
which defaults to false, meaning by default the module will now create the IAM authorization policies required to enable the IAM credentials engine by creating policies that grants the Secrets Manager instance 'Operator' access to the IAM identity service, and 'Groups Service Member Manage' access to the IAM groups service (#237) (e5d4806)v1.24.3
Compare Source
Bug Fixes
v1.24.2
Compare Source
Bug Fixes
v1.24.1
Compare Source
Bug Fixes
v1.24.0
Compare Source
(#290) (fef71c3)
Features
kms_key_ring_name
has been changed from "sm-cos-key-ring" --> "secrets-manager-key-ring"kms_key_name
has been changed from "sm-cos-key" --> "secrets-manager-key"iam_engine_name
has been changed from "base-sm-iam-engine" --> "iam-engine"secrets_manager_instance_name
has been changed from "base-security-services-sm" --> "secrets-manager"NOTE: If upgrading from a previous release, to prevent infrastructure being destroyed and recreated, you can override the defaults back to their original values.
v1.23.9
Compare Source
Bug Fixes
v1.23.8
Compare Source
Bug Fixes
v1.23.7
Compare Source
Bug Fixes
v1.23.6
Compare Source
Bug Fixes
v1.23.5
Compare Source
Bug Fixes
v1.23.4
Compare Source
Bug Fixes
- you can now supply key-protect or hyper-protect keys to the fscloud module for encryption (007f829)
v1.23.3
Compare Source
Bug Fixes
v1.23.2
Compare Source
Bug Fixes
v1.23.1
Compare Source
Bug Fixes
v1.23.0
Compare Source
Features
existing_secrets_endpoint_type
andallowed_network
inputs have been removed. (#259) (cc1ef7f)Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.