88# #############################################################################
99
1010module "resource_group" {
11- source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.0.6 "
11+ source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.1.0 "
1212 # if an existing resource group is not set (null) create a new one using prefix
1313 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1414 existing_resource_group_name = var. resource_group
@@ -20,7 +20,7 @@ module "resource_group" {
2020
2121module "key_protect_all_inclusive" {
2222 source = " terraform-ibm-modules/key-protect-all-inclusive/ibm"
23- version = " 4.2 .0"
23+ version = " 4.4 .0"
2424 resource_group_id = module. resource_group . resource_group_id
2525 # Only us-south, eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
2626 # Note: Database instance and Key Protect must be created on the same region.
@@ -93,7 +93,7 @@ resource "ibm_resource_instance" "secrets_manager" {
9393# Add a Secrets Group to the secret manager instance
9494module "secrets_manager_secrets_group" {
9595 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
96- version = " 1.0.1 "
96+ version = " 1.1.0 "
9797 region = local. sm_region
9898 secrets_manager_guid = local. sm_guid
9999 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -104,7 +104,7 @@ module "secrets_manager_secrets_group" {
104104# Add service credentials to secret manager as a username/password secret type in the created secret group
105105module "secrets_manager_service_credentials_user_pass" {
106106 source = " terraform-ibm-modules/secrets-manager-secret/ibm"
107- version = " 1.0.0 "
107+ version = " 1.1.1 "
108108 for_each = var. service_credential_names
109109 region = local. sm_region
110110 secrets_manager_guid = local. sm_guid
@@ -119,7 +119,7 @@ module "secrets_manager_service_credentials_user_pass" {
119119# Add secrets manager certificate to secret manager as a certificate secret type in the created secret group
120120module "secrets_manager_service_credentials_cert" {
121121 source = " terraform-ibm-modules/secrets-manager-secret/ibm"
122- version = " 1.0.0 "
122+ version = " 1.1.1 "
123123 region = local. sm_region
124124 secrets_manager_guid = local. sm_guid
125125 secret_group_id = module. secrets_manager_secrets_group . secret_group_id
0 commit comments