diff --git a/.secrets.baseline b/.secrets.baseline index b52b29d..c155011 100644 --- a/.secrets.baseline +++ b/.secrets.baseline @@ -3,7 +3,7 @@ "files": "go.sum|^.secrets.baseline$", "lines": null }, - "generated_at": "2024-03-06T16:42:37Z", + "generated_at": "2025-10-17T22:23:15Z", "plugins_used": [ { "name": "AWSKeyDetector" @@ -77,7 +77,7 @@ } ], "results": {}, - "version": "0.13.1+ibm.62.dss", + "version": "0.13.1+ibm.64.dss", "word_list": { "file": null, "hash": null diff --git a/common-dev-assets b/common-dev-assets index 95eee19..3c754bf 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit 95eee1969a5ad814bfa2e5a07b03c8ee6b589271 +Subproject commit 3c754bf732e99f95e77014077d2d7ed4b29c55b0 diff --git a/examples/api_key_auth/main.tf b/examples/api_key_auth/main.tf index ddfa783..4c0a486 100644 --- a/examples/api_key_auth/main.tf +++ b/examples/api_key_auth/main.tf @@ -7,7 +7,7 @@ locals { module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -23,7 +23,7 @@ module "existing_sm_crn_parser" { module "secrets_manager" { count = var.existing_sm_instance_crn == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.10.1" + version = "2.10.3" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure diff --git a/examples/iam_auth/main.tf b/examples/iam_auth/main.tf index dd3555e..f2dc8fe 100644 --- a/examples/iam_auth/main.tf +++ b/examples/iam_auth/main.tf @@ -5,7 +5,7 @@ locals { module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -13,7 +13,7 @@ module "resource_group" { module "secrets_manager" { source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.10.1" + version = "2.10.3" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure diff --git a/solutions/fully-configurable/version.tf b/solutions/fully-configurable/version.tf index d1b97d3..f7e1915 100644 --- a/solutions/fully-configurable/version.tf +++ b/solutions/fully-configurable/version.tf @@ -3,7 +3,7 @@ terraform { required_providers { ibm = { source = "IBM-Cloud/ibm" - version = "1.83.1" + version = "1.84.1" } } } diff --git a/tests/go.mod b/tests/go.mod index bf672b7..ee827fd 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -2,7 +2,7 @@ module github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-public-cer go 1.24.0 -toolchain go1.25.1 +toolchain go1.25.3 require ( github.com/gruntwork-io/terratest v0.51.0