Skip to content

Commit 863b1af

Browse files
fix(deps): update dependencies
1 parent 2fbdb18 commit 863b1af

File tree

7 files changed

+20
-22
lines changed

7 files changed

+20
-22
lines changed

examples/api_key_auth/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ locals {
77

88
module "resource_group" {
99
source = "terraform-ibm-modules/resource-group/ibm"
10-
version = "1.4.0"
10+
version = "1.4.3"
1111
# if an existing resource group is not set (null) create a new one using prefix
1212
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1313
existing_resource_group_name = var.resource_group
@@ -16,14 +16,14 @@ module "resource_group" {
1616
module "existing_sm_crn_parser" {
1717
count = var.existing_sm_instance_crn == null ? 0 : 1
1818
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19-
version = "1.3.0"
19+
version = "1.3.3"
2020
crn = var.existing_sm_instance_crn
2121
}
2222

2323
module "secrets_manager" {
2424
count = var.existing_sm_instance_crn == null ? 1 : 0
2525
source = "terraform-ibm-modules/secrets-manager/ibm"
26-
version = "2.11.9"
26+
version = "2.12.3"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region
2929
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -36,7 +36,7 @@ module "secrets_manager" {
3636
# Best practise, use the secrets manager secret group module to create a secret group
3737
module "secrets_manager_secret_group" {
3838
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
39-
version = "1.3.19"
39+
version = "1.3.25"
4040
region = local.sm_region
4141
secrets_manager_guid = local.sm_guid
4242
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -73,7 +73,7 @@ module "public_secret_engine" {
7373

7474
module "secrets_manager_public_certificate" {
7575
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
76-
version = "1.5.0"
76+
version = "1.5.7"
7777
depends_on = [module.public_secret_engine]
7878

7979
cert_common_name = local.cert_common_name

examples/iam_auth/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ locals {
55

66
module "resource_group" {
77
source = "terraform-ibm-modules/resource-group/ibm"
8-
version = "1.4.0"
8+
version = "1.4.3"
99
# if an existing resource group is not set (null) create a new one using prefix
1010
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1111
existing_resource_group_name = var.resource_group
1212
}
1313

1414
module "secrets_manager" {
1515
source = "terraform-ibm-modules/secrets-manager/ibm"
16-
version = "2.11.9"
16+
version = "2.12.3"
1717
resource_group_id = module.resource_group.resource_group_id
1818
region = var.region
1919
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -24,7 +24,7 @@ module "secrets_manager" {
2424
# Best practise, use the secrets manager secret group module to create a secret group
2525
module "secrets_manager_secret_group" {
2626
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
27-
version = "1.3.19"
27+
version = "1.3.25"
2828
region = var.region
2929
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
3030
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -54,7 +54,7 @@ module "public_secret_engine" {
5454

5555
module "secrets_manager_public_certificate" {
5656
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
57-
version = "1.5.0"
57+
version = "1.5.7"
5858
depends_on = [module.public_secret_engine]
5959

6060
cert_common_name = local.cert_common_name

solutions/fully-configurable/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,14 +9,14 @@ locals {
99

1010
module "secrets_manager_crn_parser" {
1111
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
12-
version = "1.3.0"
12+
version = "1.3.3"
1313
crn = var.existing_secrets_manager_crn
1414
}
1515

1616
module "secret_crn_parser" {
1717
count = local.parse_acme_lets_encrypt_private_key
1818
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19-
version = "1.3.0"
19+
version = "1.3.3"
2020
crn = var.acme_letsencrypt_private_key_secrets_manager_secret_crn
2121
}
2222

solutions/fully-configurable/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ terraform {
33
required_providers {
44
ibm = {
55
source = "IBM-Cloud/ibm"
6-
version = "1.85.0"
6+
version = "1.86.0"
77
}
88
}
99
}

tests/go.mod

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,11 @@
11
module github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-public-cert-engine
22

3-
go 1.24.0
4-
5-
toolchain go1.25.4
3+
go 1.25.5
64

75
require (
86
github.com/gruntwork-io/terratest v0.54.0
97
github.com/stretchr/testify v1.11.1
10-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.34
8+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.4
119
)
1210

1311
require (
@@ -42,7 +40,7 @@ require (
4240
github.com/go-logr/logr v1.4.2 // indirect
4341
github.com/go-logr/stdr v1.2.2 // indirect
4442
github.com/go-openapi/analysis v0.23.0 // indirect
45-
github.com/go-openapi/errors v0.22.4 // indirect
43+
github.com/go-openapi/errors v0.22.5 // indirect
4644
github.com/go-openapi/jsonpointer v0.21.1 // indirect
4745
github.com/go-openapi/jsonreference v0.21.0 // indirect
4846
github.com/go-openapi/loads v0.22.0 // indirect

tests/go.sum

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,8 @@ github.com/go-openapi/analysis v0.23.0 h1:aGday7OWupfMs+LbmLZG4k0MYXIANxcuBTYUC0
8383
github.com/go-openapi/analysis v0.23.0/go.mod h1:9mz9ZWaSlV8TvjQHLl2mUW2PbZtemkE8yA5v22ohupo=
8484
github.com/go-openapi/errors v0.19.8/go.mod h1:cM//ZKUKyO06HSwqAelJ5NsEMMcpa6VpXe8DOa1Mi1M=
8585
github.com/go-openapi/errors v0.20.3/go.mod h1:Z3FlZ4I8jEGxjUK+bugx3on2mIAk4txuAOhlsB1FSgk=
86-
github.com/go-openapi/errors v0.22.4 h1:oi2K9mHTOb5DPW2Zjdzs/NIvwi2N3fARKaTJLdNabaM=
87-
github.com/go-openapi/errors v0.22.4/go.mod h1:z9S8ASTUqx7+CP1Q8dD8ewGH/1JWFFLX/2PmAYNQLgk=
86+
github.com/go-openapi/errors v0.22.5 h1:Yfv4O/PRYpNF3BNmVkEizcHb3uLVVsrDt3LNdgAKRY4=
87+
github.com/go-openapi/errors v0.22.5/go.mod h1:z9S8ASTUqx7+CP1Q8dD8ewGH/1JWFFLX/2PmAYNQLgk=
8888
github.com/go-openapi/jsonpointer v0.21.1 h1:whnzv/pNXtK2FbX/W9yJfRmE2gsmkfahjMKB0fZvcic=
8989
github.com/go-openapi/jsonpointer v0.21.1/go.mod h1:50I1STOfbY1ycR8jGz8DaMeLCdXiI6aDteEdRNNzpdk=
9090
github.com/go-openapi/jsonreference v0.21.0 h1:Rs+Y7hSXT83Jacb7kFyjn4ijOuVGSvOdF2+tg1TRrwQ=
@@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
297297
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
298298
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
299299
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
300-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.34 h1:eED28nDc2If2KjsEi5VBAUt0at+FxVJw/lUcwzeW8Ck=
301-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.34/go.mod h1:VCaRJKjjwIqWMdXqMwvC/9WCwWe8lBTRZrkYrQbcNUU=
300+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.4 h1:Y0IvIJDQi1Fyr9bki3kLovqDl9DZWIFrtA7cuwT/rJ0=
301+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.61.4/go.mod h1:clGPU4e57ofDSgBbNSzjNMf4KlJxSbVbU0O3FLpqRns=
302302
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
303303
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
304304
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=

0 commit comments

Comments
 (0)