diff --git a/examples/complete/main.tf b/examples/complete/main.tf index 0f996dab..e15ea47c 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -95,7 +95,7 @@ module "icd_elasticsearch" { module "secrets_manager" { count = var.existing_sm_instance_guid == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm" - version = "1.23.6" + version = "1.23.7" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" @@ -118,7 +118,7 @@ module "secrets_manager_secrets_group" { # Add service credentials to secret manager as a username/password secret type in the created secret group module "secrets_manager_service_credentials_user_pass" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.6.0" + version = "1.7.0" for_each = local.service_credential_names region = local.sm_region secrets_manager_guid = local.sm_guid @@ -133,7 +133,7 @@ module "secrets_manager_service_credentials_user_pass" { # Add Elasticsearch certificate to secret manager as a certificate secret type in the created secret group module "secrets_manager_service_credentials_cert" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.6.0" + version = "1.7.0" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.secrets_manager_secrets_group.secret_group_id diff --git a/solutions/standard/main.tf b/solutions/standard/main.tf index f79023d2..43a27b3e 100644 --- a/solutions/standard/main.tf +++ b/solutions/standard/main.tf @@ -422,7 +422,7 @@ module "secrets_manager_service_credentials" { count = var.existing_secrets_manager_instance_crn == null ? 0 : 1 depends_on = [time_sleep.wait_for_es_authorization_policy] source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets" - version = "1.23.6" + version = "1.23.7" existing_sm_instance_guid = local.existing_secrets_manager_instance_guid existing_sm_instance_region = local.existing_secrets_manager_instance_region endpoint_type = var.existing_secrets_manager_endpoint_type