diff --git a/examples/api_key_auth/main.tf b/examples/api_key_auth/main.tf index a5309f8..ca1c16e 100644 --- a/examples/api_key_auth/main.tf +++ b/examples/api_key_auth/main.tf @@ -16,14 +16,14 @@ module "resource_group" { module "existing_sm_crn_parser" { count = var.existing_sm_instance_crn == null ? 0 : 1 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.6" + version = "1.3.7" crn = var.existing_sm_instance_crn } module "secrets_manager" { count = var.existing_sm_instance_crn == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.12.7" + version = "2.12.8" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure @@ -36,7 +36,7 @@ module "secrets_manager" { # Best practise, use the secrets manager secret group module to create a secret group module "secrets_manager_secret_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.29" + version = "1.3.30" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -73,7 +73,7 @@ module "public_secret_engine" { module "secrets_manager_public_certificate" { source = "terraform-ibm-modules/secrets-manager-public-cert/ibm" - version = "1.5.12" + version = "1.5.13" depends_on = [module.public_secret_engine] cert_common_name = local.cert_common_name diff --git a/examples/iam_auth/main.tf b/examples/iam_auth/main.tf index f6792fd..40fe223 100644 --- a/examples/iam_auth/main.tf +++ b/examples/iam_auth/main.tf @@ -13,7 +13,7 @@ module "resource_group" { module "secrets_manager" { source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.12.7" + version = "2.12.8" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure @@ -24,7 +24,7 @@ module "secrets_manager" { # Best practise, use the secrets manager secret group module to create a secret group module "secrets_manager_secret_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.29" + version = "1.3.30" region = var.region secrets_manager_guid = module.secrets_manager.secrets_manager_guid secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -54,7 +54,7 @@ module "public_secret_engine" { module "secrets_manager_public_certificate" { source = "terraform-ibm-modules/secrets-manager-public-cert/ibm" - version = "1.5.12" + version = "1.5.13" depends_on = [module.public_secret_engine] cert_common_name = local.cert_common_name diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 99d286d..41b269b 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -9,14 +9,14 @@ locals { module "secrets_manager_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.6" + version = "1.3.7" crn = var.existing_secrets_manager_crn } module "secret_crn_parser" { count = local.parse_acme_lets_encrypt_private_key source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.3.6" + version = "1.3.7" crn = var.acme_letsencrypt_private_key_secrets_manager_secret_crn }