File tree Expand file tree Collapse file tree 2 files changed +4
-4
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -98,7 +98,7 @@ module "icd_elasticsearch" {
9898module "secrets_manager" {
9999 count = var. existing_sm_instance_guid == null ? 1 : 0
100100 source = " terraform-ibm-modules/secrets-manager/ibm"
101- version = " 2.12.4 "
101+ version = " 2.12.5 "
102102 resource_group_id = module. resource_group . resource_group_id
103103 region = var. region
104104 secrets_manager_name = " ${ var . prefix } -secrets-manager"
@@ -110,7 +110,7 @@ module "secrets_manager" {
110110# Add a Secrets Group to the secret manager instance
111111module "secrets_manager_secrets_group" {
112112 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
113- version = " 1.3.26 "
113+ version = " 1.3.27 "
114114 region = local. secrets_manager_region
115115 secrets_manager_guid = local. secrets_manager_guid
116116 # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -432,7 +432,7 @@ locals {
432432module "secrets_manager_service_credentials" {
433433 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
434434 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
435- version = " 2.12.4 "
435+ version = " 2.12.5 "
436436 # converted into implicit dependency and removed explicit depends_on time_sleep.wait_for_elasticsearch_authorization_policy for this module because of issue https://github.com/terraform-ibm-modules/terraform-ibm-icd-redis/issues/608
437437 existing_sm_instance_guid = local. create_secrets_manager_auth_policy > 0 ? time_sleep. wait_for_elasticsearch_authorization_policy [0 ]. triggers [" secrets_manager_guid" ] : local. existing_secrets_manager_instance_guid
438438 existing_sm_instance_region = local. create_secrets_manager_auth_policy > 0 ? time_sleep. wait_for_elasticsearch_authorization_policy [0 ]. triggers [" secrets_manager_region" ] : local. existing_secrets_manager_instance_region
@@ -483,7 +483,7 @@ data "external" "es_metadata" {
483483module "code_engine_kibana" {
484484 count = var. enable_kibana_dashboard ? 1 : 0
485485 source = " terraform-ibm-modules/code-engine/ibm"
486- version = " 4.7.7 "
486+ version = " 4.7.8 "
487487 resource_group_id = module. resource_group . resource_group_id
488488 project_name = local. code_engine_project_name
489489 existing_project_id = local. code_engine_project_id
You can’t perform that action at this time.
0 commit comments