File tree Expand file tree Collapse file tree 7 files changed +16
-16
lines changed
complete-no-rotation-policy Expand file tree Collapse file tree 7 files changed +16
-16
lines changed Original file line number Diff line number Diff line change @@ -15,10 +15,10 @@ End to end example with the complete Secrets-Manager objects lifecycle including
1515| Name | Source | Version |
1616| ------| --------| ---------|
1717| <a name =" module_dynamic_serviceid_apikey1 " ></a > [ dynamic\_ serviceid\_ apikey1] ( #module\_ dynamic\_ serviceid\_ apikey1 ) | ../.. | n/a |
18- | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.0 |
18+ | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.1 |
1919| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | terraform-ibm-modules/secrets-manager/ibm | 2.12.0 |
20- | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.19 |
21- | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.19 |
20+ | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.20 |
21+ | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.20 |
2222
2323### Resources
2424
Original file line number Diff line number Diff line change @@ -13,7 +13,7 @@ locals {
1313
1414module "resource_group" {
1515 source = " terraform-ibm-modules/resource-group/ibm"
16- version = " 1.4.0 "
16+ version = " 1.4.1 "
1717 # if an existing resource group is not set (null) create a new one using prefix
1818 resource_group_name = var. resource_group == null ? " ${ var . prefix } -rg" : null
1919 existing_resource_group_name = var. resource_group
@@ -42,7 +42,7 @@ module "secrets_manager" {
4242# Additional Secrets-Manager Secret-Group for SERVICE level secrets
4343module "secrets_manager_group_acct" {
4444 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
45- version = " 1.3.19 "
45+ version = " 1.3.20 "
4646 region = local. sm_region
4747 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
4848 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -53,7 +53,7 @@ module "secrets_manager_group_acct" {
5353
5454module "secrets_manager_group_service" {
5555 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
56- version = " 1.3.19 "
56+ version = " 1.3.20 "
5757 region = local. sm_region
5858 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
5959 # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -15,10 +15,10 @@ End to end example with the complete Secrets-Manager objects lifecycle including
1515| Name | Source | Version |
1616| ------| --------| ---------|
1717| <a name =" module_dynamic_serviceid_apikey1 " ></a > [ dynamic\_ serviceid\_ apikey1] ( #module\_ dynamic\_ serviceid\_ apikey1 ) | ../.. | n/a |
18- | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.0 |
18+ | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.1 |
1919| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | terraform-ibm-modules/secrets-manager/ibm | 2.12.0 |
20- | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.19 |
21- | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.19 |
20+ | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.20 |
21+ | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.20 |
2222
2323### Resources
2424
Original file line number Diff line number Diff line change @@ -13,7 +13,7 @@ locals {
1313
1414module "resource_group" {
1515 source = " terraform-ibm-modules/resource-group/ibm"
16- version = " 1.4.0 "
16+ version = " 1.4.1 "
1717 # if an existing resource group is not set (null) create a new one using prefix
1818 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1919 existing_resource_group_name = var. resource_group
@@ -41,7 +41,7 @@ module "secrets_manager" {
4141# Additional Secrets-Manager Secret-Group for SERVICE level secrets
4242module "secrets_manager_group_acct" {
4343 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
44- version = " 1.3.19 "
44+ version = " 1.3.20 "
4545 region = local. sm_region
4646 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
4747 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -51,7 +51,7 @@ module "secrets_manager_group_acct" {
5151
5252module "secrets_manager_group_service" {
5353 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
54- version = " 1.3.19 "
54+ version = " 1.3.20 "
5555 region = local. sm_region
5656 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
5757 # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -4,7 +4,7 @@ go 1.25.5
44
55require (
66 github.com/stretchr/testify v1.11.1
7- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.2
7+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.3
88)
99
1010require (
Original file line number Diff line number Diff line change @@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
297297github.com/stretchr/testify v1.8.2 /go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4 =
298298github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U =
299299github.com/stretchr/testify v1.11.1 /go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U =
300- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.2 h1:GEDNJCyDS7mRepOTSxDpmJKVmiRUSFy3u9biQ4ZYxzc =
301- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.2 /go.mod h1:VCaRJKjjwIqWMdXqMwvC/9WCwWe8lBTRZrkYrQbcNUU =
300+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.3 h1:WXEXd5qCDVk7In6I284qHJOjLplTzgpRDuzds8Lcvv0 =
301+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.3 /go.mod h1:hpvue7kivZNIvyXKFyBPU1rzutyxid2yzjDR1s7NW7s =
302302github.com/tidwall/pretty v1.0.0 /go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk =
303303github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw =
304304github.com/tmccombs/hcl2json v0.6.4 /go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk =
You can’t perform that action at this time.
0 commit comments