88# #############################################################################
99
1010module "resource_group" {
11- source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.1.5 "
11+ source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.1.6 "
1212 # if an existing resource group is not set (null) create a new one using prefix
1313 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1414 existing_resource_group_name = var. resource_group
@@ -20,7 +20,7 @@ module "resource_group" {
2020
2121module "key_protect_all_inclusive" {
2222 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
23- version = " 4.13.2 "
23+ version = " 4.13.4 "
2424 resource_group_id = module. resource_group . resource_group_id
2525 # Only us-south, eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
2626 # Note: Database instance and Key Protect must be created on the same region.
@@ -89,7 +89,7 @@ resource "elasticsearch_cluster_settings" "global" {
8989# Create Secrets Manager Instance (if not using existing one)
9090module "secrets_manager" {
9191 source = " terraform-ibm-modules/secrets-manager/ibm"
92- version = " 1.13.5 "
92+ version = " 1.14.0 "
9393 resource_group_id = module. resource_group . resource_group_id
9494 region = var. region
9595 secrets_manager_name = " ${ var . prefix } -secrets-manager"
@@ -101,7 +101,7 @@ module "secrets_manager" {
101101# Add a Secrets Group to the secret manager instance
102102module "secrets_manager_secrets_group" {
103103 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
104- version = " 1.2.1 "
104+ version = " 1.2.2 "
105105 region = local. sm_region
106106 secrets_manager_guid = local. sm_guid
107107 # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -112,7 +112,7 @@ module "secrets_manager_secrets_group" {
112112# Add service credentials to secret manager as a username/password secret type in the created secret group
113113module "secrets_manager_service_credentials_user_pass" {
114114 source = " terraform-ibm-modules/secrets-manager-secret/ibm"
115- version = " 1.3.1 "
115+ version = " 1.3.2 "
116116 for_each = var. service_credential_names
117117 region = local. sm_region
118118 secrets_manager_guid = local. sm_guid
@@ -127,7 +127,7 @@ module "secrets_manager_service_credentials_user_pass" {
127127# Add secrets manager certificate to secret manager as a certificate secret type in the created secret group
128128module "secrets_manager_service_credentials_cert" {
129129 source = " terraform-ibm-modules/secrets-manager-secret/ibm"
130- version = " 1.3.1 "
130+ version = " 1.3.2 "
131131 region = local. sm_region
132132 secrets_manager_guid = local. sm_guid
133133 secret_group_id = module. secrets_manager_secrets_group . secret_group_id
0 commit comments