99module "resource_group" {
1010 count = var. existing_secrets_manager_crn == null ? 1 : 0
1111 source = " terraform-ibm-modules/resource-group/ibm"
12- version = " 1.1.5 "
12+ version = " 1.1.6 "
1313 resource_group_name = var. use_existing_resource_group == false ? (var. prefix != null ? " ${ var . prefix } -${ var . resource_group_name } " : var. resource_group_name ) : null
1414 existing_resource_group_name = var. use_existing_resource_group == true ? var. resource_group_name : null
1515}
@@ -34,7 +34,7 @@ module "kms" {
3434 }
3535 count = var. existing_secrets_manager_crn != null || var. existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
3636 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
37- version = " 4.13.1 "
37+ version = " 4.13.2 "
3838 create_key_protect_instance = false
3939 region = local. kms_region
4040 existing_kms_instance_guid = local. existing_kms_guid
@@ -95,7 +95,7 @@ module "secrets_manager" {
9595module "iam_secrets_engine" {
9696 count = var. iam_engine_enabled ? 1 : 0
9797 source = " terraform-ibm-modules/secrets-manager-iam-engine/ibm"
98- version = " 1.2.1 "
98+ version = " 1.2.2 "
9999 region = local. secrets_manager_region
100100 iam_engine_name = var. prefix != null ? " ${ var . prefix } -${ var . iam_engine_name } " : var. iam_engine_name
101101 secrets_manager_guid = local. secrets_manager_guid
@@ -113,7 +113,7 @@ locals {
113113module "secrets_manager_public_cert_engine" {
114114 count = var. public_engine_enabled ? 1 : 0
115115 source = " terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
116- version = " 1.0.0 "
116+ version = " 1.0.1 "
117117 providers = {
118118 ibm = ibm
119119 ibm.secret-store = ibm
@@ -133,7 +133,7 @@ module "secrets_manager_public_cert_engine" {
133133module "private_secret_engine" {
134134 count = var. private_engine_enabled ? 1 : 0
135135 source = " terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
136- version = " 1.3.1 "
136+ version = " 1.3.2 "
137137 secrets_manager_guid = local. secrets_manager_guid
138138 region = var. region
139139 root_ca_name = var. root_ca_name
0 commit comments