@@ -89,7 +89,7 @@ resource "elasticsearch_cluster_settings" "global" {
8989# Create Secrets Manager Instance (if not using existing one)
9090module "secrets_manager" {
9191 source = " terraform-ibm-modules/secrets-manager/ibm"
92- version = " 1.11.0 "
92+ version = " 1.12.4 "
9393 resource_group_id = module. resource_group . resource_group_id
9494 region = var. region
9595 secrets_manager_name = " ${ var . prefix } -secrets-manager"
@@ -101,7 +101,7 @@ module "secrets_manager" {
101101# Add a Secrets Group to the secret manager instance
102102module "secrets_manager_secrets_group" {
103103 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
104- version = " 1.2.0 "
104+ version = " 1.2.1 "
105105 region = local. sm_region
106106 secrets_manager_guid = local. sm_guid
107107 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -112,7 +112,7 @@ module "secrets_manager_secrets_group" {
112112# Add service credentials to secret manager as a username/password secret type in the created secret group
113113module "secrets_manager_service_credentials_user_pass" {
114114 source = " terraform-ibm-modules/secrets-manager-secret/ibm"
115- version = " 1.3.0 "
115+ version = " 1.3.1 "
116116 for_each = var. service_credential_names
117117 region = local. sm_region
118118 secrets_manager_guid = local. sm_guid
@@ -127,7 +127,7 @@ module "secrets_manager_service_credentials_user_pass" {
127127# Add secrets manager certificate to secret manager as a certificate secret type in the created secret group
128128module "secrets_manager_service_credentials_cert" {
129129 source = " terraform-ibm-modules/secrets-manager-secret/ibm"
130- version = " 1.3.0 "
130+ version = " 1.3.1 "
131131 region = local. sm_region
132132 secrets_manager_guid = local. sm_guid
133133 secret_group_id = module. secrets_manager_secrets_group . secret_group_id
0 commit comments