Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,8 +60,8 @@ The following attributes and parameters are supported when creating Key Value se
## Overview
* [terraform-ibm-secrets-manager-secret](#terraform-ibm-secrets-manager-secret)
* [Examples](./examples)
* [Example creating arbitrary, username_password and imported_cert type secrets](./examples/complete)
* [Private-Only Secret Manager example](./examples/private)
* <div style="display: inline-block;"><a href="./examples/complete">Example creating arbitrary, username_password and imported_cert type secrets</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=sms-complete-example&repository=github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-secret/tree/main/examples/complete" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
* <div style="display: inline-block;"><a href="./examples/private">Private-Only Secret Manager example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=sms-private-example&repository=github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-secret/tree/main/examples/private" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
* [Contributing](#contributing)
<!-- END OVERVIEW HOOK -->

Expand Down
14 changes: 7 additions & 7 deletions examples/complete/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ module "resource_group" {
module "secrets_manager" {
count = var.existing_sm_instance_guid == null ? 1 : 0
source = "terraform-ibm-modules/secrets-manager/ibm"
version = "2.11.3"
version = "2.11.7"
resource_group_id = module.resource_group.resource_group_id
region = local.sm_region
secrets_manager_name = "${var.prefix}-secrets-manager"
Expand Down Expand Up @@ -196,7 +196,7 @@ module "secret_manager_imported_cert" {
# create a COS instance to create the service credential for
module "cloud_object_storage" {
source = "terraform-ibm-modules/cos/ibm"
version = "10.5.2"
version = "10.5.5"
resource_group_id = module.resource_group.resource_group_id
region = var.region
cos_instance_name = "${var.prefix}-cos"
Expand Down Expand Up @@ -269,7 +269,7 @@ data "ibm_sm_kv_secret" "kv_secret" {
##############################################################################
module "code_engine_project" {
source = "terraform-ibm-modules/code-engine/ibm//modules/project"
version = "4.6.9"
version = "4.6.10"
name = "${var.prefix}-project"
resource_group_id = module.resource_group.resource_group_id
}
Expand All @@ -279,7 +279,7 @@ module "code_engine_project" {
##############################################################################
module "code_engine_secret" {
source = "terraform-ibm-modules/code-engine/ibm//modules/secret"
version = "4.6.9"
version = "4.6.10"
name = "${var.prefix}-rs"
project_id = module.code_engine_project.id
format = "registry"
Expand Down Expand Up @@ -307,7 +307,7 @@ locals {

module "code_engine_build" {
source = "terraform-ibm-modules/code-engine/ibm//modules/build"
version = "4.6.9"
version = "4.6.10"
name = "${var.prefix}-build"
ibmcloud_api_key = var.ibmcloud_api_key
project_id = module.code_engine_project.id
Expand Down Expand Up @@ -337,7 +337,7 @@ locals {
module "code_engine_job" {
depends_on = [module.code_engine_build]
source = "terraform-ibm-modules/code-engine/ibm//modules/job"
version = "4.6.9"
version = "4.6.10"
name = "${var.prefix}-job"
image_reference = local.output_image
image_secret = module.code_engine_secret.name
Expand All @@ -358,7 +358,7 @@ module "code_engine_job" {
module "custom_credential_engine" {
depends_on = [module.code_engine_job]
source = "terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm"
version = "1.0.6"
version = "1.0.8"
secrets_manager_guid = local.sm_guid
secrets_manager_region = local.sm_region
custom_credential_engine_name = "${var.prefix}-test-custom-engine"
Expand Down
14 changes: 7 additions & 7 deletions examples/private/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ module "resource_group" {

module "secrets_manager" {
source = "terraform-ibm-modules/secrets-manager/ibm"
version = "2.11.3"
version = "2.11.7"
existing_sm_instance_crn = var.existing_sm_instance_crn
resource_group_id = module.resource_group.resource_group_id
region = local.sm_region
Expand Down Expand Up @@ -200,7 +200,7 @@ module "secret_manager_imported_cert" {
# create a COS instance to create the service credential for
module "cloud_object_storage" {
source = "terraform-ibm-modules/cos/ibm"
version = "10.5.2"
version = "10.5.5"
resource_group_id = module.resource_group.resource_group_id
region = local.sm_region
cos_instance_name = "${var.prefix}-cos"
Expand Down Expand Up @@ -273,7 +273,7 @@ data "ibm_sm_kv_secret" "kv_secret" {
##############################################################################
module "code_engine_project" {
source = "terraform-ibm-modules/code-engine/ibm//modules/project"
version = "4.6.9"
version = "4.6.10"
name = "${var.prefix}-project"
resource_group_id = module.resource_group.resource_group_id
}
Expand All @@ -283,7 +283,7 @@ module "code_engine_project" {
##############################################################################
module "code_engine_secret" {
source = "terraform-ibm-modules/code-engine/ibm//modules/secret"
version = "4.6.9"
version = "4.6.10"
name = "${var.prefix}-rs"
project_id = module.code_engine_project.id
format = "registry"
Expand Down Expand Up @@ -311,7 +311,7 @@ locals {

module "code_engine_build" {
source = "terraform-ibm-modules/code-engine/ibm//modules/build"
version = "4.6.9"
version = "4.6.10"
name = "${var.prefix}-build"
ibmcloud_api_key = var.ibmcloud_api_key
region = var.existing_sm_instance_region == null ? var.region : var.existing_sm_instance_region
Expand Down Expand Up @@ -341,7 +341,7 @@ locals {

module "code_engine_job" {
source = "terraform-ibm-modules/code-engine/ibm//modules/job"
version = "4.6.9"
version = "4.6.10"
name = "${var.prefix}-job"
image_reference = local.output_image
image_secret = module.code_engine_secret.name
Expand All @@ -361,7 +361,7 @@ module "code_engine_job" {

module "custom_credential_engine" {
source = "terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm"
version = "1.0.6"
version = "1.0.8"
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
secrets_manager_region = local.sm_region
custom_credential_engine_name = "${var.prefix}-test-custom-engine"
Expand Down
4 changes: 2 additions & 2 deletions tests/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,11 @@ module github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-secret

go 1.24.0

toolchain go1.25.3
toolchain go1.25.4

require (
github.com/stretchr/testify v1.11.1
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.19
gopkg.in/yaml.v3 v3.0.1
)

Expand Down
4 changes: 2 additions & 2 deletions tests/go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -296,8 +296,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17 h1:unGRxvM9OJBTsfDQg/AZCYOeJZ5TqrCsPphjWJ2wI94=
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco=
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.19 h1:6a84e97jf33CjHPz6doFNloP3XiAXE2YZ27x/Tq8AFk=
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.19/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco=
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=
Expand Down