diff --git a/README.md b/README.md index 42e016b1..43977109 100644 --- a/README.md +++ b/README.md @@ -65,9 +65,9 @@ You need the following permissions to run this module. | Name | Source | Version | |------|--------|---------| -| [backup\_key\_crn\_parser](#module\_backup\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.3 | +| [backup\_key\_crn\_parser](#module\_backup\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.5 | | [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.34.0 | -| [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.3 | +| [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.5 | ### Resources diff --git a/common-dev-assets b/common-dev-assets index ea0307f5..3468d450 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit ea0307f57511e2ddf918af142f9a8d747d7f140d +Subproject commit 3468d450dc9f0fb2e114e8d213fe59ea94fab761 diff --git a/examples/backup-restore/main.tf b/examples/backup-restore/main.tf index 24692905..9b249458 100644 --- a/examples/backup-restore/main.tf +++ b/examples/backup-restore/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.4.4" + version = "1.4.6" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group diff --git a/examples/basic/main.tf b/examples/basic/main.tf index e40c2415..c2bcb1fe 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.4.4" + version = "1.4.6" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group diff --git a/examples/complete/main.tf b/examples/complete/main.tf index ed9148ff..8f0391fa 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -19,7 +19,7 @@ locals { module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.4.4" + version = "1.4.6" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -137,7 +137,7 @@ module "icd_mongodb" { module "secrets_manager" { count = var.existing_secrets_manager_instance_guid == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.12.3" + version = "2.12.4" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" @@ -149,7 +149,7 @@ module "secrets_manager" { # Add a Secrets Group to the secret manager instance module "secrets_manager_secrets_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.25" + version = "1.3.26" region = local.secrets_manager_region secrets_manager_guid = local.secrets_manager_guid #tfsec:ignore:general-secrets-no-plaintext-exposure diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 3374dde7..f2e65df3 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.4.4" + version = "1.4.6" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group diff --git a/main.tf b/main.tf index fe97c730..a721885b 100644 --- a/main.tf +++ b/main.tf @@ -28,14 +28,14 @@ locals { module "kms_key_crn_parser" { count = local.parse_kms_key ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.3" + version = "1.3.5" crn = var.kms_key_crn } module "backup_key_crn_parser" { count = local.parse_backup_kms_key ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.3" + version = "1.3.5" crn = local.backup_encryption_key_crn } diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 68feb801..eae9b6f0 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -7,7 +7,7 @@ locals { module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.4.4" + version = "1.4.6" existing_resource_group_name = var.existing_resource_group_name } @@ -62,21 +62,21 @@ module "kms" { module "kms_instance_crn_parser" { count = var.existing_kms_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.3" + version = "1.3.5" crn = var.existing_kms_instance_crn } module "kms_key_crn_parser" { count = var.existing_kms_key_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.3" + version = "1.3.5" crn = var.existing_kms_key_crn } module "kms_backup_key_crn_parser" { count = var.existing_backup_kms_key_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.3" + version = "1.3.5" crn = var.existing_backup_kms_key_crn } @@ -239,7 +239,7 @@ locals { module "mongodb_instance_crn_parser" { count = var.existing_mongodb_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.3" + version = "1.3.5" crn = var.existing_mongodb_instance_crn } @@ -328,7 +328,7 @@ locals { module "secrets_manager_instance_crn_parser" { count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.3" + version = "1.3.5" crn = var.existing_secrets_manager_instance_crn } @@ -399,7 +399,7 @@ locals { module "secrets_manager_service_credentials" { count = length(local.service_credential_secrets) > 0 ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets" - version = "2.12.3" + version = "2.12.4" # converted into implicit dependency and removed explicit depends_on time_sleep.wait_for_mongodb_authorization_policy for this module because of issue https://github.com/terraform-ibm-modules/terraform-ibm-icd-redis/issues/608 existing_sm_instance_guid = local.create_secrets_manager_auth_policy > 0 ? time_sleep.wait_for_mongodb_authorization_policy[0].triggers["secrets_manager_guid"] : local.existing_secrets_manager_instance_guid existing_sm_instance_region = local.create_secrets_manager_auth_policy > 0 ? time_sleep.wait_for_mongodb_authorization_policy[0].triggers["secrets_manager_region"] : local.existing_secrets_manager_instance_region diff --git a/tests/go.mod b/tests/go.mod index 938c61bd..f7834d0e 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -6,7 +6,7 @@ require ( github.com/google/uuid v1.6.0 github.com/gruntwork-io/terratest v0.54.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.63.1 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.63.2 ) require ( diff --git a/tests/go.sum b/tests/go.sum index 5fd13763..cd465950 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.63.1 h1:OfAXXOucAQtzhQrRZx3q6tdore8XH0LkRqCbgipt/1Y= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.63.1/go.mod h1:HqX0S0Ue19y7TJRGR5+Np2Aq0xElgw3mM3zZCWwQc1I= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.63.2 h1:nvVWXM78z1qBxmaSbSDd+66N37liZiKJWl/UecvJ6LY= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.63.2/go.mod h1:HqX0S0Ue19y7TJRGR5+Np2Aq0xElgw3mM3zZCWwQc1I= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=