diff --git a/common-dev-assets b/common-dev-assets index a4e4a683..47c0edbc 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit a4e4a683410392c39f62583b1fe64b3861e058d8 +Subproject commit 47c0edbc6d669874511116e4cb645097d10561b9 diff --git a/examples/complete/main.tf b/examples/complete/main.tf index 02ab18d7..bc6bc9fa 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -53,7 +53,7 @@ locals { module "key_protect_all_inclusive" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.24" + version = "5.1.25" resource_group_id = module.resource_group.resource_group_id # Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details. # Note: Database instance and Key Protect must be created on the same region. @@ -137,7 +137,7 @@ module "icd_mongodb" { module "secrets_manager" { count = var.existing_secrets_manager_instance_guid == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.8.10" + version = "2.9.0" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" @@ -160,7 +160,7 @@ module "secrets_manager_secrets_group" { # Add service credentials to secret manager as a username/password secret type in the created secret group module "secrets_manager_service_credentials_user_pass" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.8.0" + version = "1.9.0" for_each = local.service_credential_names region = local.secrets_manager_region secrets_manager_guid = local.secrets_manager_guid @@ -175,7 +175,7 @@ module "secrets_manager_service_credentials_user_pass" { # Add MongoDB certificate to secret manager as a certificate secret type in the created secret group. module "secrets_manager_service_credentials_cert" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.8.0" + version = "1.9.0" region = local.secrets_manager_region secrets_manager_guid = local.secrets_manager_guid secret_group_id = module.secrets_manager_secrets_group.secret_group_id diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index c518257b..86c98664 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -32,7 +32,7 @@ module "kms" { } count = local.create_new_kms_key ? 1 : 0 source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.24" + version = "5.1.25" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn @@ -396,7 +396,7 @@ module "secrets_manager_service_credentials" { count = length(local.service_credential_secrets) > 0 ? 1 : 0 depends_on = [time_sleep.wait_for_mongodb_authorization_policy] source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets" - version = "2.8.10" + version = "2.9.0" existing_sm_instance_guid = local.existing_secrets_manager_instance_guid existing_sm_instance_region = local.existing_secrets_manager_instance_region endpoint_type = var.existing_secrets_manager_endpoint_type diff --git a/tests/go.mod b/tests/go.mod index 98d855eb..4203abfd 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -8,7 +8,7 @@ require ( github.com/google/uuid v1.6.0 github.com/gruntwork-io/terratest v0.50.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 ) require ( @@ -93,7 +93,7 @@ require ( golang.org/x/crypto v0.41.0 // indirect golang.org/x/mod v0.26.0 // indirect golang.org/x/net v0.42.0 // indirect - golang.org/x/sync v0.16.0 // indirect + golang.org/x/sync v0.17.0 // indirect golang.org/x/sys v0.35.0 // indirect golang.org/x/text v0.28.0 // indirect golang.org/x/tools v0.35.0 // indirect diff --git a/tests/go.sum b/tests/go.sum index 826285bc..b0b26b3c 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -295,8 +295,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4 h1:dG1Y+Rc48nGCfI5kgcjVv4S9WV4+aoAAwyXOniMBnpo= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4/go.mod h1:Of4ASK2oTVTQ8J6RAZ7eHaYL6VOY/aO07cBV7NTMhgY= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 h1:Tr7AlrQ+s1Nc9VOwB+It8sItnDOXhfXTxKqI2KtdyFA= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6/go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk= @@ -396,8 +396,8 @@ golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y= golang.org/x/sync v0.5.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk= -golang.org/x/sync v0.16.0 h1:ycBJEhp9p4vXvUZNszeOq0kGTPghopOL8q0fq3vstxw= -golang.org/x/sync v0.16.0/go.mod h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA= +golang.org/x/sync v0.17.0 h1:l60nONMj9l5drqw6jlhIELNv9I0A4OFgRsG9k2oT9Ug= +golang.org/x/sync v0.17.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI= golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=