diff --git a/examples/api_key_auth/main.tf b/examples/api_key_auth/main.tf index 6e1c4c7..e3ded7c 100644 --- a/examples/api_key_auth/main.tf +++ b/examples/api_key_auth/main.tf @@ -7,7 +7,7 @@ locals { module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.2.0" + version = "1.2.1" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -16,14 +16,14 @@ module "resource_group" { module "existing_sm_crn_parser" { count = var.existing_sm_instance_crn == null ? 0 : 1 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.existing_sm_instance_crn } module "secrets_manager" { count = var.existing_sm_instance_crn == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.3.2" + version = "2.6.3" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure @@ -36,7 +36,7 @@ module "secrets_manager" { # Best practise, use the secrets manager secret group module to create a secret group module "secrets_manager_secret_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.7" + version = "1.3.8" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -73,7 +73,7 @@ module "public_secret_engine" { module "secrets_manager_public_certificate" { source = "terraform-ibm-modules/secrets-manager-public-cert/ibm" - version = "1.3.0" + version = "1.3.1" depends_on = [module.public_secret_engine] cert_common_name = local.cert_common_name diff --git a/examples/iam_auth/main.tf b/examples/iam_auth/main.tf index fbdbdcb..6bfdb5e 100644 --- a/examples/iam_auth/main.tf +++ b/examples/iam_auth/main.tf @@ -5,7 +5,7 @@ locals { module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.2.0" + version = "1.2.1" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -13,7 +13,7 @@ module "resource_group" { module "secrets_manager" { source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.3.2" + version = "2.6.3" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure @@ -24,7 +24,7 @@ module "secrets_manager" { # Best practise, use the secrets manager secret group module to create a secret group module "secrets_manager_secret_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.7" + version = "1.3.8" region = var.region secrets_manager_guid = module.secrets_manager.secrets_manager_guid secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -54,7 +54,7 @@ module "public_secret_engine" { module "secrets_manager_public_certificate" { source = "terraform-ibm-modules/secrets-manager-public-cert/ibm" - version = "1.3.0" + version = "1.3.1" depends_on = [module.public_secret_engine] cert_common_name = local.cert_common_name diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index ffa7876..a2d2db0 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -9,14 +9,14 @@ locals { module "secrets_manager_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.existing_secrets_manager_crn } module "secret_crn_parser" { count = local.parse_acme_lets_encrypt_private_key source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.acme_letsencrypt_private_key_secrets_manager_secret_crn } diff --git a/solutions/fully-configurable/version.tf b/solutions/fully-configurable/version.tf index 5e71416..a7da027 100644 --- a/solutions/fully-configurable/version.tf +++ b/solutions/fully-configurable/version.tf @@ -3,7 +3,7 @@ terraform { required_providers { ibm = { source = "IBM-Cloud/ibm" - version = "= 1.79.0" + version = "1.79.2" } } }