diff --git a/common-dev-assets b/common-dev-assets
index a4e4a683..47c0edbc 160000
--- a/common-dev-assets
+++ b/common-dev-assets
@@ -1 +1 @@
-Subproject commit a4e4a683410392c39f62583b1fe64b3861e058d8
+Subproject commit 47c0edbc6d669874511116e4cb645097d10561b9
diff --git a/examples/complete/README.md b/examples/complete/README.md
index 825d5ece..cc6e3602 100644
--- a/examples/complete/README.md
+++ b/examples/complete/README.md
@@ -16,13 +16,13 @@ This examples handles the provisioning of a new Secrets Manager instance.
| Name | Source | Version |
|------|--------|---------|
-| [code\_engine\_build](#module\_code\_engine\_build) | terraform-ibm-modules/code-engine/ibm//modules/build | 4.5.8 |
-| [code\_engine\_job](#module\_code\_engine\_job) | terraform-ibm-modules/code-engine/ibm//modules/job | 4.5.8 |
-| [code\_engine\_project](#module\_code\_engine\_project) | terraform-ibm-modules/code-engine/ibm//modules/project | 4.5.8 |
-| [code\_engine\_secret](#module\_code\_engine\_secret) | terraform-ibm-modules/code-engine/ibm//modules/secret | 4.5.8 |
-| [custom\_credential\_engine](#module\_custom\_credential\_engine) | terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm | 1.0.0 |
-| [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 2.6.24 |
-| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.24 |
+| [code\_engine\_build](#module\_code\_engine\_build) | terraform-ibm-modules/code-engine/ibm//modules/build | 4.5.13 |
+| [code\_engine\_job](#module\_code\_engine\_job) | terraform-ibm-modules/code-engine/ibm//modules/job | 4.5.13 |
+| [code\_engine\_project](#module\_code\_engine\_project) | terraform-ibm-modules/code-engine/ibm//modules/project | 4.5.13 |
+| [code\_engine\_secret](#module\_code\_engine\_secret) | terraform-ibm-modules/code-engine/ibm//modules/secret | 4.5.13 |
+| [custom\_credential\_engine](#module\_custom\_credential\_engine) | terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm | 1.0.1 |
+| [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 2.7.0 |
+| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.25 |
| [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.3.0 |
| [secret\_manager\_custom\_credential](#module\_secret\_manager\_custom\_credential) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.9.0 |
| [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
diff --git a/examples/complete/main.tf b/examples/complete/main.tf
index f1b8eac7..9170d017 100644
--- a/examples/complete/main.tf
+++ b/examples/complete/main.tf
@@ -8,7 +8,7 @@ module "resource_group" {
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "5.1.24"
+ version = "5.1.25"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region
@@ -27,7 +27,7 @@ module "key_protect" {
module "event_notification" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "2.6.24"
+ version = "2.7.0"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
@@ -107,7 +107,7 @@ module "secrets_manager" {
##############################################################################
module "code_engine_project" {
source = "terraform-ibm-modules/code-engine/ibm//modules/project"
- version = "4.5.8"
+ version = "4.5.13"
name = "${var.prefix}-project"
resource_group_id = module.resource_group.resource_group_id
}
@@ -122,7 +122,7 @@ locals {
module "code_engine_secret" {
source = "terraform-ibm-modules/code-engine/ibm//modules/secret"
- version = "4.5.8"
+ version = "4.5.13"
name = "${var.prefix}-rs"
project_id = module.code_engine_project.id
format = "registry"
@@ -148,7 +148,7 @@ resource "ibm_cr_namespace" "rg_namespace" {
# For example the region is hardcoded to us-south in order to hardcode the output image and region for creating Code Engine Project and build
module "code_engine_build" {
source = "terraform-ibm-modules/code-engine/ibm//modules/build"
- version = "4.5.8"
+ version = "4.5.13"
name = "${var.prefix}-build"
region = var.region
ibmcloud_api_key = var.ibmcloud_api_key
@@ -179,7 +179,7 @@ locals {
module "code_engine_job" {
depends_on = [module.code_engine_build]
source = "terraform-ibm-modules/code-engine/ibm//modules/job"
- version = "4.5.8"
+ version = "4.5.13"
name = "${var.prefix}-job"
image_reference = local.output_image
image_secret = module.code_engine_secret.name
@@ -200,7 +200,7 @@ module "code_engine_job" {
module "custom_credential_engine" {
depends_on = [module.secrets_manager, module.code_engine_job]
source = "terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm"
- version = "1.0.0"
+ version = "1.0.1"
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
secrets_manager_region = module.secrets_manager.secrets_manager_region
custom_credential_engine_name = "${var.prefix}-test-custom-engine"
diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf
index 983396e3..c2c0e9fe 100644
--- a/examples/fscloud/main.tf
+++ b/examples/fscloud/main.tf
@@ -42,7 +42,7 @@ module "cbr_zone" {
module "event_notification" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "2.6.24"
+ version = "2.7.0"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf
index e14fdd99..b6fe8179 100644
--- a/solutions/fully-configurable/main.tf
+++ b/solutions/fully-configurable/main.tf
@@ -130,7 +130,7 @@ module "kms" {
}
count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "5.1.24"
+ version = "5.1.25"
create_key_protect_instance = false
region = local.kms_region
existing_kms_instance_crn = var.existing_kms_instance_crn
diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf
index b79f144f..18459d96 100644
--- a/tests/existing-resources/main.tf
+++ b/tests/existing-resources/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "event_notifications" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "2.6.24"
+ version = "2.7.0"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "5.1.24"
+ version = "5.1.25"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region
diff --git a/tests/go.mod b/tests/go.mod
index 76f4d5d2..28080ecf 100644
--- a/tests/go.mod
+++ b/tests/go.mod
@@ -7,7 +7,7 @@ toolchain go1.25.1
require (
github.com/gruntwork-io/terratest v0.50.0
github.com/stretchr/testify v1.11.1
- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4
+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6
)
require (
@@ -95,7 +95,7 @@ require (
golang.org/x/crypto v0.41.0 // indirect
golang.org/x/mod v0.26.0 // indirect
golang.org/x/net v0.42.0 // indirect
- golang.org/x/sync v0.16.0 // indirect
+ golang.org/x/sync v0.17.0 // indirect
golang.org/x/sys v0.35.0 // indirect
golang.org/x/text v0.28.0 // indirect
golang.org/x/tools v0.35.0 // indirect
diff --git a/tests/go.sum b/tests/go.sum
index 636f2362..8cb99db0 100644
--- a/tests/go.sum
+++ b/tests/go.sum
@@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
-github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4 h1:dG1Y+Rc48nGCfI5kgcjVv4S9WV4+aoAAwyXOniMBnpo=
-github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4/go.mod h1:Of4ASK2oTVTQ8J6RAZ7eHaYL6VOY/aO07cBV7NTMhgY=
+github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 h1:Tr7AlrQ+s1Nc9VOwB+It8sItnDOXhfXTxKqI2KtdyFA=
+github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6/go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE=
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=
@@ -398,8 +398,8 @@ golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
golang.org/x/sync v0.5.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
-golang.org/x/sync v0.16.0 h1:ycBJEhp9p4vXvUZNszeOq0kGTPghopOL8q0fq3vstxw=
-golang.org/x/sync v0.16.0/go.mod h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA=
+golang.org/x/sync v0.17.0 h1:l60nONMj9l5drqw6jlhIELNv9I0A4OFgRsG9k2oT9Ug=
+golang.org/x/sync v0.17.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=