77
88module "resource_group" {
99 source = " terraform-ibm-modules/resource-group/ibm"
10- version = " 1.2.0 "
10+ version = " 1.2.1 "
1111 # if an existing resource group is not set (null) create a new one using prefix
1212 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1313 existing_resource_group_name = var. resource_group
@@ -16,14 +16,14 @@ module "resource_group" {
1616module "existing_sm_crn_parser" {
1717 count = var. existing_sm_instance_crn == null ? 0 : 1
1818 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19- version = " 1.1 .0"
19+ version = " 1.2 .0"
2020 crn = var. existing_sm_instance_crn
2121}
2222
2323module "secrets_manager" {
2424 count = var. existing_sm_instance_crn == null ? 1 : 0
2525 source = " terraform-ibm-modules/secrets-manager/ibm"
26- version = " 2.3.2 "
26+ version = " 2.6.3 "
2727 resource_group_id = module. resource_group . resource_group_id
2828 region = var. region
2929 secrets_manager_name = " ${ var . prefix } -secrets-manager" # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -36,7 +36,7 @@ module "secrets_manager" {
3636# Best practise, use the secrets manager secret group module to create a secret group
3737module "secrets_manager_secret_group" {
3838 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
39- version = " 1.3.7 "
39+ version = " 1.3.8 "
4040 region = local. sm_region
4141 secrets_manager_guid = local. sm_guid
4242 secret_group_name = " ${ var . prefix } -certificates-secret-group" # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -73,7 +73,7 @@ module "public_secret_engine" {
7373
7474module "secrets_manager_public_certificate" {
7575 source = " terraform-ibm-modules/secrets-manager-public-cert/ibm"
76- version = " 1.3.0 "
76+ version = " 1.3.1 "
7777 depends_on = [module . public_secret_engine ]
7878
7979 cert_common_name = local. cert_common_name
0 commit comments