File tree Expand file tree Collapse file tree 5 files changed +13
-13
lines changed
complete-no-rotation-policy Expand file tree Collapse file tree 5 files changed +13
-13
lines changed Original file line number Diff line number Diff line change @@ -15,10 +15,10 @@ End to end example with the complete Secrets-Manager objects lifecycle including
1515| Name | Source | Version |
1616| ------| --------| ---------|
1717| <a name =" module_dynamic_serviceid_apikey1 " ></a > [ dynamic\_ serviceid\_ apikey1] ( #module\_ dynamic\_ serviceid\_ apikey1 ) | ../.. | n/a |
18- | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.2 |
18+ | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.3 |
1919| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | terraform-ibm-modules/secrets-manager/ibm | 2.12.2 |
20- | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.22 |
21- | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.22 |
20+ | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.23 |
21+ | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.23 |
2222
2323### Resources
2424
Original file line number Diff line number Diff line change @@ -13,7 +13,7 @@ locals {
1313
1414module "resource_group" {
1515 source = " terraform-ibm-modules/resource-group/ibm"
16- version = " 1.4.2 "
16+ version = " 1.4.3 "
1717 # if an existing resource group is not set (null) create a new one using prefix
1818 resource_group_name = var. resource_group == null ? " ${ var . prefix } -rg" : null
1919 existing_resource_group_name = var. resource_group
@@ -42,7 +42,7 @@ module "secrets_manager" {
4242# Additional Secrets-Manager Secret-Group for SERVICE level secrets
4343module "secrets_manager_group_acct" {
4444 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
45- version = " 1.3.22 "
45+ version = " 1.3.23 "
4646 region = local. sm_region
4747 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
4848 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -53,7 +53,7 @@ module "secrets_manager_group_acct" {
5353
5454module "secrets_manager_group_service" {
5555 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
56- version = " 1.3.22 "
56+ version = " 1.3.23 "
5757 region = local. sm_region
5858 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
5959 # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -15,10 +15,10 @@ End to end example with the complete Secrets-Manager objects lifecycle including
1515| Name | Source | Version |
1616| ------| --------| ---------|
1717| <a name =" module_dynamic_serviceid_apikey1 " ></a > [ dynamic\_ serviceid\_ apikey1] ( #module\_ dynamic\_ serviceid\_ apikey1 ) | ../.. | n/a |
18- | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.2 |
18+ | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.4.3 |
1919| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | terraform-ibm-modules/secrets-manager/ibm | 2.12.2 |
20- | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.22 |
21- | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.22 |
20+ | <a name =" module_secrets_manager_group_acct " ></a > [ secrets\_ manager\_ group\_ acct] ( #module\_ secrets\_ manager\_ group\_ acct ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.23 |
21+ | <a name =" module_secrets_manager_group_service " ></a > [ secrets\_ manager\_ group\_ service] ( #module\_ secrets\_ manager\_ group\_ service ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.23 |
2222
2323### Resources
2424
Original file line number Diff line number Diff line change @@ -13,7 +13,7 @@ locals {
1313
1414module "resource_group" {
1515 source = " terraform-ibm-modules/resource-group/ibm"
16- version = " 1.4.2 "
16+ version = " 1.4.3 "
1717 # if an existing resource group is not set (null) create a new one using prefix
1818 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1919 existing_resource_group_name = var. resource_group
@@ -41,7 +41,7 @@ module "secrets_manager" {
4141# Additional Secrets-Manager Secret-Group for SERVICE level secrets
4242module "secrets_manager_group_acct" {
4343 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
44- version = " 1.3.22 "
44+ version = " 1.3.23 "
4545 region = local. sm_region
4646 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
4747 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -51,7 +51,7 @@ module "secrets_manager_group_acct" {
5151
5252module "secrets_manager_group_service" {
5353 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
54- version = " 1.3.22 "
54+ version = " 1.3.23 "
5555 region = local. sm_region
5656 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
5757 # tfsec:ignore:general-secrets-no-plaintext-exposure
You can’t perform that action at this time.
0 commit comments