Skip to content

Commit 5a9e638

Browse files
fix(deps): update terraform dependencies (#236)
1 parent 73eced2 commit 5a9e638

File tree

4 files changed

+12
-12
lines changed

4 files changed

+12
-12
lines changed

examples/api_key_auth/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ locals {
77

88
module "resource_group" {
99
source = "terraform-ibm-modules/resource-group/ibm"
10-
version = "1.2.0"
10+
version = "1.2.1"
1111
# if an existing resource group is not set (null) create a new one using prefix
1212
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1313
existing_resource_group_name = var.resource_group
@@ -16,14 +16,14 @@ module "resource_group" {
1616
module "existing_sm_crn_parser" {
1717
count = var.existing_sm_instance_crn == null ? 0 : 1
1818
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19-
version = "1.1.0"
19+
version = "1.2.0"
2020
crn = var.existing_sm_instance_crn
2121
}
2222

2323
module "secrets_manager" {
2424
count = var.existing_sm_instance_crn == null ? 1 : 0
2525
source = "terraform-ibm-modules/secrets-manager/ibm"
26-
version = "2.3.2"
26+
version = "2.6.3"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region
2929
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -36,7 +36,7 @@ module "secrets_manager" {
3636
# Best practise, use the secrets manager secret group module to create a secret group
3737
module "secrets_manager_secret_group" {
3838
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
39-
version = "1.3.7"
39+
version = "1.3.8"
4040
region = local.sm_region
4141
secrets_manager_guid = local.sm_guid
4242
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -73,7 +73,7 @@ module "public_secret_engine" {
7373

7474
module "secrets_manager_public_certificate" {
7575
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
76-
version = "1.3.0"
76+
version = "1.3.1"
7777
depends_on = [module.public_secret_engine]
7878

7979
cert_common_name = local.cert_common_name

examples/iam_auth/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ locals {
55

66
module "resource_group" {
77
source = "terraform-ibm-modules/resource-group/ibm"
8-
version = "1.2.0"
8+
version = "1.2.1"
99
# if an existing resource group is not set (null) create a new one using prefix
1010
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1111
existing_resource_group_name = var.resource_group
1212
}
1313

1414
module "secrets_manager" {
1515
source = "terraform-ibm-modules/secrets-manager/ibm"
16-
version = "2.3.2"
16+
version = "2.6.3"
1717
resource_group_id = module.resource_group.resource_group_id
1818
region = var.region
1919
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -24,7 +24,7 @@ module "secrets_manager" {
2424
# Best practise, use the secrets manager secret group module to create a secret group
2525
module "secrets_manager_secret_group" {
2626
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
27-
version = "1.3.7"
27+
version = "1.3.8"
2828
region = var.region
2929
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
3030
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -54,7 +54,7 @@ module "public_secret_engine" {
5454

5555
module "secrets_manager_public_certificate" {
5656
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
57-
version = "1.3.0"
57+
version = "1.3.1"
5858
depends_on = [module.public_secret_engine]
5959

6060
cert_common_name = local.cert_common_name

solutions/fully-configurable/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@ locals {
99

1010
module "secrets_manager_crn_parser" {
1111
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
12-
version = "1.1.0"
12+
version = "1.2.0"
1313
crn = var.existing_secrets_manager_crn
1414
}
1515

1616
module "secret_crn_parser" {
1717
count = local.parse_acme_lets_encrypt_private_key
1818
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19-
version = "1.1.0"
19+
version = "1.2.0"
2020
crn = var.acme_letsencrypt_private_key_secrets_manager_secret_crn
2121
}
2222

solutions/fully-configurable/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ terraform {
33
required_providers {
44
ibm = {
55
source = "IBM-Cloud/ibm"
6-
version = "= 1.79.0"
6+
version = "1.79.2"
77
}
88
}
99
}

0 commit comments

Comments
 (0)