@@ -13,7 +13,7 @@ locals {
1313
1414module "resource_group" {
1515 source = " terraform-ibm-modules/resource-group/ibm"
16- version = " 1.4.4 "
16+ version = " 1.4.6 "
1717 # if an existing resource group is not set (null) create a new one using prefix
1818 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1919 existing_resource_group_name = var. resource_group
@@ -27,7 +27,7 @@ module "resource_group" {
2727
2828module "secrets_manager" {
2929 source = " terraform-ibm-modules/secrets-manager/ibm"
30- version = " 2.12.3 "
30+ version = " 2.12.5 "
3131 existing_sm_instance_crn = var. existing_sm_instance_crn
3232 skip_iam_authorization_policy = var. skip_iam_authorization_policy
3333 resource_group_id = module. resource_group . resource_group_id
@@ -41,7 +41,7 @@ module "secrets_manager" {
4141# Additional Secrets-Manager Secret-Group for SERVICE level secrets
4242module "secrets_manager_group_acct" {
4343 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
44- version = " 1.3.25 "
44+ version = " 1.3.28 "
4545 region = local. sm_region
4646 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
4747 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -51,7 +51,7 @@ module "secrets_manager_group_acct" {
5151
5252module "secrets_manager_group_service" {
5353 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
54- version = " 1.3.25 "
54+ version = " 1.3.28 "
5555 region = local. sm_region
5656 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
5757 # tfsec:ignore:general-secrets-no-plaintext-exposure
0 commit comments