diff --git a/examples/complete/main.tf b/examples/complete/main.tf index 67c49064..d3d0f864 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -98,7 +98,7 @@ module "icd_elasticsearch" { module "secrets_manager" { count = var.existing_sm_instance_guid == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.11.2" + version = "2.11.3" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 818d1cb9..0a63f7e8 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -432,7 +432,7 @@ locals { module "secrets_manager_service_credentials" { count = length(local.service_credential_secrets) > 0 ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets" - version = "2.11.2" + version = "2.11.3" # converted into implicit dependency and removed explicit depends_on time_sleep.wait_for_elasticsearch_authorization_policy for this module because of issue https://github.com/terraform-ibm-modules/terraform-ibm-icd-redis/issues/608 existing_sm_instance_guid = local.create_secrets_manager_auth_policy > 0 ? time_sleep.wait_for_elasticsearch_authorization_policy[0].triggers["secrets_manager_guid"] : local.existing_secrets_manager_instance_guid existing_sm_instance_region = local.create_secrets_manager_auth_policy > 0 ? time_sleep.wait_for_elasticsearch_authorization_policy[0].triggers["secrets_manager_region"] : local.existing_secrets_manager_instance_region