Skip to content

Conversation

@terraform-ibm-modules-ops
Copy link
Contributor

This PR contains the following updates:

Package Type Update Change
terraform-ibm-modules/secrets-manager/ibm (source) module major 1.24.3 -> 2.0.0

Release Notes

terraform-ibm-modules/terraform-ibm-secrets-manager (terraform-ibm-modules/secrets-manager/ibm)

v2.0.0

Compare Source

Features
  • added 2 new DA variations: "Fully configurable" and "Security-enforced"
  • The "standard" variation has been deprecated does not exist in this release (#​300) (b548403)
BREAKING CHANGES
  • There is no upgrade path from the deprecated "Standard" DA variation to either of the new "Fully configurable" or "Security-enforced variations

v1.26.0

Compare Source

Features

(#​295) (a0cab06)

  • The KMS auth policy has been updated so its now scoped to the exact KMS key. If upgrading from an older version this will recreate the auth policy, however it will create the new one before destroying the old one so there is no disruption to every day services.
  • The kms_instance_guid input has been removed from the module. It is now programmatically determined from the value of kms_key_crn
  • A new boolean input is_hpcs_key has been added to the module and should be set to true if the key specified in kms_key_crn is from a Hyper Protect instance. Leave it at false if using Key Protect. If set to true, a second auth policy is created which allows the Secrets Manager instance Viewer access to the HPCS instance.

v1.25.5

Compare Source

Bug Fixes

v1.25.4

Compare Source

Bug Fixes
  • deps: update terraform ibm to latest for the deployable architecture solution (#​310) (c458399)

v1.25.3

Compare Source

Bug Fixes
  • expose the skip_iam_authorization_policy in the fscloud submodule (#​301) (94db9b1)

v1.25.2

Compare Source

Bug Fixes
  • deps: update required_provider to latest for the deployable architecture solution (#​305) (f12d4e9)

v1.25.1

Compare Source

Bug Fixes

v1.25.0

Compare Source

Features
  • Added new input skip_iam_authorization_policy which defaults to false, meaning by default the module will now create the IAM authorization policies required to enable the IAM credentials engine by creating policies that grants the Secrets Manager instance 'Operator' access to the IAM identity service, and 'Groups Service Member Manage' access to the IAM groups service (#​237) (e5d4806)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@terraform-ibm-modules-dev

/run pipeline

@ocofaigh
Copy link
Contributor

ocofaigh commented Apr 1, 2025

Changes are coming in #190

@terraform-ibm-modules-ops terraform-ibm-modules-ops changed the title chore(deps): update terraform terraform-ibm-modules/secrets-manager/ibm to v2 chore(deps): update terraform terraform-ibm-modules/secrets-manager/ibm to v2 - autoclosed Apr 4, 2025
@terraform-ibm-modules-ops terraform-ibm-modules-ops deleted the renovate/major-terraform-module branch April 4, 2025 19:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants