Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions examples/api_key_auth/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ locals {

module "resource_group" {
source = "terraform-ibm-modules/resource-group/ibm"
version = "1.2.0"
version = "1.2.1"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group
Expand All @@ -16,14 +16,14 @@ module "resource_group" {
module "existing_sm_crn_parser" {
count = var.existing_sm_instance_crn == null ? 0 : 1
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
version = "1.1.0"
version = "1.2.0"
crn = var.existing_sm_instance_crn
}

module "secrets_manager" {
count = var.existing_sm_instance_crn == null ? 1 : 0
source = "terraform-ibm-modules/secrets-manager/ibm"
version = "2.3.2"
version = "2.6.3"
resource_group_id = module.resource_group.resource_group_id
region = var.region
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
Expand All @@ -36,7 +36,7 @@ module "secrets_manager" {
# Best practise, use the secrets manager secret group module to create a secret group
module "secrets_manager_secret_group" {
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
version = "1.3.7"
version = "1.3.8"
region = local.sm_region
secrets_manager_guid = local.sm_guid
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
Expand Down Expand Up @@ -73,7 +73,7 @@ module "public_secret_engine" {

module "secrets_manager_public_certificate" {
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
version = "1.3.0"
version = "1.3.1"
depends_on = [module.public_secret_engine]

cert_common_name = local.cert_common_name
Expand Down
8 changes: 4 additions & 4 deletions examples/iam_auth/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,15 +5,15 @@ locals {

module "resource_group" {
source = "terraform-ibm-modules/resource-group/ibm"
version = "1.2.0"
version = "1.2.1"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group
}

module "secrets_manager" {
source = "terraform-ibm-modules/secrets-manager/ibm"
version = "2.3.2"
version = "2.6.3"
resource_group_id = module.resource_group.resource_group_id
region = var.region
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
Expand All @@ -24,7 +24,7 @@ module "secrets_manager" {
# Best practise, use the secrets manager secret group module to create a secret group
module "secrets_manager_secret_group" {
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
version = "1.3.7"
version = "1.3.8"
region = var.region
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
Expand Down Expand Up @@ -54,7 +54,7 @@ module "public_secret_engine" {

module "secrets_manager_public_certificate" {
source = "terraform-ibm-modules/secrets-manager-public-cert/ibm"
version = "1.3.0"
version = "1.3.1"
depends_on = [module.public_secret_engine]

cert_common_name = local.cert_common_name
Expand Down
4 changes: 2 additions & 2 deletions solutions/fully-configurable/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -9,14 +9,14 @@ locals {

module "secrets_manager_crn_parser" {
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
version = "1.1.0"
version = "1.2.0"
crn = var.existing_secrets_manager_crn
}

module "secret_crn_parser" {
count = local.parse_acme_lets_encrypt_private_key
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
version = "1.1.0"
version = "1.2.0"
crn = var.acme_letsencrypt_private_key_secrets_manager_secret_crn
}

Expand Down
2 changes: 1 addition & 1 deletion solutions/fully-configurable/version.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ terraform {
required_providers {
ibm = {
source = "IBM-Cloud/ibm"
version = "= 1.79.0"
version = "1.79.2"
}
}
}