File tree Expand file tree Collapse file tree 4 files changed +12
-12
lines changed
complete-no-rotation-policy Expand file tree Collapse file tree 4 files changed +12
-12
lines changed Original file line number Diff line number Diff line change @@ -16,9 +16,9 @@ End to end example with the complete Secrets-Manager objects lifecycle including
1616| ------| --------| ---------|
1717| <a name =" module_dynamic_serviceid_apikey1 " ></a > [ dynamic\_ serviceid\_ apikey1] ( #module\_ dynamic\_ serviceid\_ apikey1 ) | ../.. | n/a |
1818| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.3 |
19- | <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | terraform-ibm-modules/secrets-manager/ibm | 2.12.2 |
20- | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.23 |
21- | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.23 |
19+ | <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | terraform-ibm-modules/secrets-manager/ibm | 2.12.3 |
20+ | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.24 |
21+ | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.24 |
2222
2323### Resources
2424
Original file line number Diff line number Diff line change @@ -27,7 +27,7 @@ module "resource_group" {
2727
2828module "secrets_manager" {
2929 source = " terraform-ibm-modules/secrets-manager/ibm"
30- version = " 2.12.2 "
30+ version = " 2.12.3 "
3131 existing_sm_instance_crn = var. existing_sm_instance_crn
3232 skip_iam_authorization_policy = var. skip_iam_authorization_policy
3333 resource_group_id = module. resource_group . resource_group_id
@@ -42,7 +42,7 @@ module "secrets_manager" {
4242# Additional Secrets-Manager Secret-Group for SERVICE level secrets
4343module "secrets_manager_group_acct" {
4444 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
45- version = " 1.3.23 "
45+ version = " 1.3.24 "
4646 region = local. sm_region
4747 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
4848 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -53,7 +53,7 @@ module "secrets_manager_group_acct" {
5353
5454module "secrets_manager_group_service" {
5555 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
56- version = " 1.3.23 "
56+ version = " 1.3.24 "
5757 region = local. sm_region
5858 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
5959 # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -16,9 +16,9 @@ End to end example with the complete Secrets-Manager objects lifecycle including
1616| ------| --------| ---------|
1717| <a name =" module_dynamic_serviceid_apikey1 " ></a > [ dynamic\_ serviceid\_ apikey1] ( #module\_ dynamic\_ serviceid\_ apikey1 ) | ../.. | n/a |
1818| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.3 |
19- | <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | terraform-ibm-modules/secrets-manager/ibm | 2.12.2 |
20- | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.23 |
21- | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.23 |
19+ | <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | terraform-ibm-modules/secrets-manager/ibm | 2.12.3 |
20+ | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.24 |
21+ | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.24 |
2222
2323### Resources
2424
Original file line number Diff line number Diff line change @@ -27,7 +27,7 @@ module "resource_group" {
2727
2828module "secrets_manager" {
2929 source = " terraform-ibm-modules/secrets-manager/ibm"
30- version = " 2.12.2 "
30+ version = " 2.12.3 "
3131 existing_sm_instance_crn = var. existing_sm_instance_crn
3232 skip_iam_authorization_policy = var. skip_iam_authorization_policy
3333 resource_group_id = module. resource_group . resource_group_id
@@ -41,7 +41,7 @@ module "secrets_manager" {
4141# Additional Secrets-Manager Secret-Group for SERVICE level secrets
4242module "secrets_manager_group_acct" {
4343 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
44- version = " 1.3.23 "
44+ version = " 1.3.24 "
4545 region = local. sm_region
4646 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
4747 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -51,7 +51,7 @@ module "secrets_manager_group_acct" {
5151
5252module "secrets_manager_group_service" {
5353 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
54- version = " 1.3.23 "
54+ version = " 1.3.24 "
5555 region = local. sm_region
5656 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
5757 # tfsec:ignore:general-secrets-no-plaintext-exposure
You can’t perform that action at this time.
0 commit comments