File tree Expand file tree Collapse file tree 3 files changed +9
-9
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 3 files changed +9
-9
lines changed Original file line number Diff line number Diff line change @@ -16,14 +16,14 @@ module "resource_group" {
1616module "existing_sm_crn_parser" {
1717 count = var. existing_sm_instance_crn == null ? 0 : 1
1818 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19- version = " 1.3.6 "
19+ version = " 1.3.7 "
2020 crn = var. existing_sm_instance_crn
2121}
2222
2323module "secrets_manager" {
2424 count = var. existing_sm_instance_crn == null ? 1 : 0
2525 source = " terraform-ibm-modules/secrets-manager/ibm"
26- version = " 2.12.7 "
26+ version = " 2.12.8 "
2727 resource_group_id = module. resource_group . resource_group_id
2828 region = var. region
2929 secrets_manager_name = " ${ var . prefix } -secrets-manager" # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -36,7 +36,7 @@ module "secrets_manager" {
3636# Best practise, use the secrets manager secret group module to create a secret group
3737module "secrets_manager_secret_group" {
3838 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
39- version = " 1.3.29 "
39+ version = " 1.3.30 "
4040 region = local. sm_region
4141 secrets_manager_guid = local. sm_guid
4242 secret_group_name = " ${ var . prefix } -certificates-secret-group" # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -73,7 +73,7 @@ module "public_secret_engine" {
7373
7474module "secrets_manager_public_certificate" {
7575 source = " terraform-ibm-modules/secrets-manager-public-cert/ibm"
76- version = " 1.5.12 "
76+ version = " 1.5.13 "
7777 depends_on = [module . public_secret_engine ]
7878
7979 cert_common_name = local. cert_common_name
Original file line number Diff line number Diff line change @@ -13,7 +13,7 @@ module "resource_group" {
1313
1414module "secrets_manager" {
1515 source = " terraform-ibm-modules/secrets-manager/ibm"
16- version = " 2.12.7 "
16+ version = " 2.12.8 "
1717 resource_group_id = module. resource_group . resource_group_id
1818 region = var. region
1919 secrets_manager_name = " ${ var . prefix } -secrets-manager" # tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -24,7 +24,7 @@ module "secrets_manager" {
2424# Best practise, use the secrets manager secret group module to create a secret group
2525module "secrets_manager_secret_group" {
2626 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
27- version = " 1.3.29 "
27+ version = " 1.3.30 "
2828 region = var. region
2929 secrets_manager_guid = module. secrets_manager . secrets_manager_guid
3030 secret_group_name = " ${ var . prefix } -certificates-secret-group" # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -54,7 +54,7 @@ module "public_secret_engine" {
5454
5555module "secrets_manager_public_certificate" {
5656 source = " terraform-ibm-modules/secrets-manager-public-cert/ibm"
57- version = " 1.5.12 "
57+ version = " 1.5.13 "
5858 depends_on = [module . public_secret_engine ]
5959
6060 cert_common_name = local. cert_common_name
Original file line number Diff line number Diff line change @@ -9,14 +9,14 @@ locals {
99
1010module "secrets_manager_crn_parser" {
1111 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
12- version = " 1.3.6 "
12+ version = " 1.3.7 "
1313 crn = var. existing_secrets_manager_crn
1414}
1515
1616module "secret_crn_parser" {
1717 count = local. parse_acme_lets_encrypt_private_key
1818 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19- version = " 1.3.6 "
19+ version = " 1.3.7 "
2020 crn = var. acme_letsencrypt_private_key_secrets_manager_secret_crn
2121}
2222
You can’t perform that action at this time.
0 commit comments