Skip to content

Commit 7e70452

Browse files
chore(deps): update terraform-module (#201)
1 parent 860d481 commit 7e70452

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

examples/api_key_auth/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ module "existing_sm_crn_parser" {
2323
module "secrets_manager" {
2424
count = var.existing_sm_instance_crn == null ? 1 : 0
2525
source = "terraform-ibm-modules/secrets-manager/ibm"
26-
version = "1.25.1"
26+
version = "1.25.4"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region
2929
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -36,7 +36,7 @@ module "secrets_manager" {
3636
# Best practise, use the secrets manager secret group module to create a secret group
3737
module "secrets_manager_secret_group" {
3838
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
39-
version = "1.2.2"
39+
version = "1.2.3"
4040
region = local.sm_region
4141
secrets_manager_guid = local.sm_guid
4242
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -73,7 +73,7 @@ module "public_secret_engine" {
7373

7474
module "secrets_manager_public_certificate" {
7575
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
76-
version = "1.2.1"
76+
version = "1.2.2"
7777
depends_on = [module.public_secret_engine]
7878

7979
cert_common_name = local.cert_common_name

examples/iam_auth/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ module "resource_group" {
1313

1414
module "secrets_manager" {
1515
source = "terraform-ibm-modules/secrets-manager/ibm"
16-
version = "1.25.1"
16+
version = "1.25.4"
1717
resource_group_id = module.resource_group.resource_group_id
1818
region = var.region
1919
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -24,7 +24,7 @@ module "secrets_manager" {
2424
# Best practise, use the secrets manager secret group module to create a secret group
2525
module "secrets_manager_secret_group" {
2626
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
27-
version = "1.2.2"
27+
version = "1.2.3"
2828
region = var.region
2929
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
3030
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -54,7 +54,7 @@ module "public_secret_engine" {
5454

5555
module "secrets_manager_public_certificate" {
5656
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
57-
version = "1.2.1"
57+
version = "1.2.2"
5858
depends_on = [module.public_secret_engine]
5959

6060
cert_common_name = local.cert_common_name

0 commit comments

Comments
 (0)