Skip to content

Commit 766a564

Browse files
fix(deps): update dependencies
1 parent 2fbdb18 commit 766a564

File tree

7 files changed

+17
-19
lines changed

7 files changed

+17
-19
lines changed

examples/api_key_auth/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ locals {
77

88
module "resource_group" {
99
source = "terraform-ibm-modules/resource-group/ibm"
10-
version = "1.4.0"
10+
version = "1.4.1"
1111
# if an existing resource group is not set (null) create a new one using prefix
1212
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1313
existing_resource_group_name = var.resource_group
@@ -16,14 +16,14 @@ module "resource_group" {
1616
module "existing_sm_crn_parser" {
1717
count = var.existing_sm_instance_crn == null ? 0 : 1
1818
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19-
version = "1.3.0"
19+
version = "1.3.1"
2020
crn = var.existing_sm_instance_crn
2121
}
2222

2323
module "secrets_manager" {
2424
count = var.existing_sm_instance_crn == null ? 1 : 0
2525
source = "terraform-ibm-modules/secrets-manager/ibm"
26-
version = "2.11.9"
26+
version = "2.12.0"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region
2929
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -36,7 +36,7 @@ module "secrets_manager" {
3636
# Best practise, use the secrets manager secret group module to create a secret group
3737
module "secrets_manager_secret_group" {
3838
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
39-
version = "1.3.19"
39+
version = "1.3.20"
4040
region = local.sm_region
4141
secrets_manager_guid = local.sm_guid
4242
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -73,7 +73,7 @@ module "public_secret_engine" {
7373

7474
module "secrets_manager_public_certificate" {
7575
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
76-
version = "1.5.0"
76+
version = "1.5.1"
7777
depends_on = [module.public_secret_engine]
7878

7979
cert_common_name = local.cert_common_name

examples/iam_auth/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ locals {
55

66
module "resource_group" {
77
source = "terraform-ibm-modules/resource-group/ibm"
8-
version = "1.4.0"
8+
version = "1.4.1"
99
# if an existing resource group is not set (null) create a new one using prefix
1010
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1111
existing_resource_group_name = var.resource_group
1212
}
1313

1414
module "secrets_manager" {
1515
source = "terraform-ibm-modules/secrets-manager/ibm"
16-
version = "2.11.9"
16+
version = "2.12.0"
1717
resource_group_id = module.resource_group.resource_group_id
1818
region = var.region
1919
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -24,7 +24,7 @@ module "secrets_manager" {
2424
# Best practise, use the secrets manager secret group module to create a secret group
2525
module "secrets_manager_secret_group" {
2626
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
27-
version = "1.3.19"
27+
version = "1.3.20"
2828
region = var.region
2929
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
3030
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -54,7 +54,7 @@ module "public_secret_engine" {
5454

5555
module "secrets_manager_public_certificate" {
5656
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
57-
version = "1.5.0"
57+
version = "1.5.1"
5858
depends_on = [module.public_secret_engine]
5959

6060
cert_common_name = local.cert_common_name

solutions/fully-configurable/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@ locals {
99

1010
module "secrets_manager_crn_parser" {
1111
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
12-
version = "1.3.0"
12+
version = "1.3.1"
1313
crn = var.existing_secrets_manager_crn
1414
}
1515

1616
module "secret_crn_parser" {
1717
count = local.parse_acme_lets_encrypt_private_key
1818
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19-
version = "1.3.0"
19+
version = "1.3.1"
2020
crn = var.acme_letsencrypt_private_key_secrets_manager_secret_crn
2121
}
2222

solutions/fully-configurable/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ terraform {
33
required_providers {
44
ibm = {
55
source = "IBM-Cloud/ibm"
6-
version = "1.85.0"
6+
version = "1.86.0"
77
}
88
}
99
}

tests/go.mod

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,11 @@
11
module github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-public-cert-engine
22

3-
go 1.24.0
4-
5-
toolchain go1.25.4
3+
go 1.25.5
64

75
require (
86
github.com/gruntwork-io/terratest v0.54.0
97
github.com/stretchr/testify v1.11.1
10-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.34
8+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.2
119
)
1210

1311
require (

tests/go.sum

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
297297
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
298298
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
299299
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
300-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.34 h1:eED28nDc2If2KjsEi5VBAUt0at+FxVJw/lUcwzeW8Ck=
301-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.34/go.mod h1:VCaRJKjjwIqWMdXqMwvC/9WCwWe8lBTRZrkYrQbcNUU=
300+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.2 h1:GEDNJCyDS7mRepOTSxDpmJKVmiRUSFy3u9biQ4ZYxzc=
301+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.2/go.mod h1:VCaRJKjjwIqWMdXqMwvC/9WCwWe8lBTRZrkYrQbcNUU=
302302
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
303303
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
304304
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=

0 commit comments

Comments
 (0)