diff --git a/README.md b/README.md
index cf41f9bf..d2aee64c 100644
--- a/README.md
+++ b/README.md
@@ -72,7 +72,7 @@ You need the following permissions to run this module.
| Name | Source | Version |
|------|--------|---------|
-| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.4 |
+| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.7 |
| [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
| [secrets](#module\_secrets) | ./modules/secrets | n/a |
diff --git a/common-dev-assets b/common-dev-assets
index 1df43f2d..ae23e021 160000
--- a/common-dev-assets
+++ b/common-dev-assets
@@ -1 +1 @@
-Subproject commit 1df43f2daf97a529d05350408d32a12f50d89fbf
+Subproject commit ae23e021950779a9c0612e71ce51d074f14b7543
diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf
index bb1363ef..bb077321 100644
--- a/examples/advanced/main.tf
+++ b/examples/advanced/main.tf
@@ -4,7 +4,7 @@
module "resource_group" {
source = "terraform-ibm-modules/resource-group/ibm"
- version = "1.3.0"
+ version = "1.4.0"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group
@@ -16,7 +16,7 @@ module "resource_group" {
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "5.3.4"
+ version = "5.4.5"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region
@@ -39,7 +39,7 @@ module "key_protect" {
module "event_notifications" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "2.9.3"
+ version = "2.10.5"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
@@ -124,7 +124,7 @@ module "secrets_manager" {
# Create new code engine project
module "code_engine_project" {
source = "terraform-ibm-modules/code-engine/ibm//modules/project"
- version = "4.6.3"
+ version = "4.6.9"
name = "${var.prefix}-project"
resource_group_id = module.resource_group.resource_group_id
}
@@ -137,7 +137,7 @@ locals {
module "code_engine_secret" {
source = "terraform-ibm-modules/code-engine/ibm//modules/secret"
- version = "4.6.3"
+ version = "4.6.9"
name = "${var.prefix}-rs"
project_id = module.code_engine_project.id
format = "registry"
@@ -157,7 +157,7 @@ resource "ibm_cr_namespace" "rg_namespace" {
# Build example Go application in Code Engine project which dynamically generates User IBM Cloud IAM API Keys
module "code_engine_build" {
source = "terraform-ibm-modules/code-engine/ibm//modules/build"
- version = "4.6.3"
+ version = "4.6.9"
name = "${var.prefix}-build"
region = var.region
ibmcloud_api_key = var.ibmcloud_api_key
@@ -186,7 +186,7 @@ locals {
module "code_engine_job" {
depends_on = [module.code_engine_build]
source = "terraform-ibm-modules/code-engine/ibm//modules/job"
- version = "4.6.3"
+ version = "4.6.9"
name = "${var.prefix}-job"
image_reference = local.output_image
image_secret = module.code_engine_secret.name
@@ -207,7 +207,7 @@ module "code_engine_job" {
module "custom_credential_engine" {
depends_on = [module.secrets_manager, module.code_engine_job]
source = "terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm"
- version = "1.0.4"
+ version = "1.0.6"
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
secrets_manager_region = module.secrets_manager.secrets_manager_region
custom_credential_engine_name = "${var.prefix}-test-custom-engine"
@@ -229,7 +229,7 @@ module "custom_credential_engine" {
module "secret_manager_custom_credential" {
depends_on = [module.secrets_manager, module.custom_credential_engine]
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
- version = "1.9.0"
+ version = "1.9.1"
secret_type = "custom_credentials" #checkov:skip=CKV_SECRET_6
region = module.secrets_manager.secrets_manager_region
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
diff --git a/examples/basic/main.tf b/examples/basic/main.tf
index fceea38d..e4d13d7c 100644
--- a/examples/basic/main.tf
+++ b/examples/basic/main.tf
@@ -1,6 +1,6 @@
module "resource_group" {
source = "terraform-ibm-modules/resource-group/ibm"
- version = "1.3.0"
+ version = "1.4.0"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group
diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf
index 55951ba0..23c0986e 100644
--- a/examples/fscloud/main.tf
+++ b/examples/fscloud/main.tf
@@ -4,7 +4,7 @@
module "resource_group" {
source = "terraform-ibm-modules/resource-group/ibm"
- version = "1.3.0"
+ version = "1.4.0"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group
@@ -20,7 +20,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
module "cbr_zone_schematics" {
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
- version = "1.33.4"
+ version = "1.33.7"
name = "${var.prefix}-schematics-zone"
zone_description = "CBR Network zone containing Schematics"
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -39,7 +39,7 @@ module "cbr_zone_schematics" {
module "event_notification" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "2.9.3"
+ version = "2.10.5"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
diff --git a/main.tf b/main.tf
index 974f4b2b..694083d8 100644
--- a/main.tf
+++ b/main.tf
@@ -163,7 +163,7 @@ locals {
module "cbr_rule" {
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
- version = "1.33.4"
+ version = "1.33.7"
rule_description = var.cbr_rules[count.index].description
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
rule_contexts = var.cbr_rules[count.index].rule_contexts
diff --git a/modules/secrets/README.md b/modules/secrets/README.md
index 6feaf8a6..8ab5badf 100644
--- a/modules/secrets/README.md
+++ b/modules/secrets/README.md
@@ -51,7 +51,7 @@ module "secrets_manager" {
| Name | Source | Version |
|------|--------|---------|
| [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.15 |
-| [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.9.0 |
+| [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.9.1 |
### Resources
diff --git a/modules/secrets/main.tf b/modules/secrets/main.tf
index 55a55381..b5ab049b 100644
--- a/modules/secrets/main.tf
+++ b/modules/secrets/main.tf
@@ -60,7 +60,7 @@ locals {
module "secrets" {
for_each = { for obj in local.secrets : obj.secret_name => obj }
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
- version = "1.9.0"
+ version = "1.9.1"
region = var.existing_sm_instance_region
secrets_manager_guid = var.existing_sm_instance_guid
secret_group_id = each.value.secret_group_id
diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf
index 008262e3..22bc1c70 100644
--- a/solutions/fully-configurable/main.tf
+++ b/solutions/fully-configurable/main.tf
@@ -7,7 +7,7 @@ locals {
module "resource_group" {
source = "terraform-ibm-modules/resource-group/ibm"
- version = "1.3.0"
+ version = "1.4.0"
existing_resource_group_name = var.existing_resource_group_name
}
@@ -130,7 +130,7 @@ module "kms" {
}
count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "5.3.4"
+ version = "5.4.5"
create_key_protect_instance = false
region = local.kms_region
existing_kms_instance_crn = var.existing_kms_instance_crn
diff --git a/solutions/fully-configurable/version.tf b/solutions/fully-configurable/version.tf
index 7c2a9559..915e808e 100644
--- a/solutions/fully-configurable/version.tf
+++ b/solutions/fully-configurable/version.tf
@@ -4,7 +4,7 @@ terraform {
required_providers {
ibm = {
source = "IBM-Cloud/ibm"
- version = "1.83.3"
+ version = "1.84.3"
}
time = {
source = "hashicorp/time"
diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf
index 45af7e6f..5ceb69bb 100644
--- a/tests/existing-resources/main.tf
+++ b/tests/existing-resources/main.tf
@@ -4,7 +4,7 @@
module "resource_group" {
source = "terraform-ibm-modules/resource-group/ibm"
- version = "1.3.0"
+ version = "1.4.0"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group
@@ -16,7 +16,7 @@ module "resource_group" {
module "event_notifications" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "2.9.3"
+ version = "2.10.5"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "5.3.4"
+ version = "5.4.5"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region
diff --git a/tests/go.mod b/tests/go.mod
index 08c85b7c..39755e35 100644
--- a/tests/go.mod
+++ b/tests/go.mod
@@ -2,13 +2,13 @@ module github.com/terraform-ibm-modules/terraform-ibm-secrets-manager
go 1.24.2
-toolchain go1.25.2
+toolchain go1.25.3
require (
github.com/IBM/go-sdk-core/v5 v5.21.0
github.com/gruntwork-io/terratest v0.51.0
github.com/stretchr/testify v1.11.1
- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.15
+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17
)
require (
diff --git a/tests/go.sum b/tests/go.sum
index a2395436..4286572c 100644
--- a/tests/go.sum
+++ b/tests/go.sum
@@ -298,8 +298,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
-github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.15 h1:vTLAB97MQ45Hfla67pIWYnb/Z5YuEzRLjQ6WN4GHWgI=
-github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.15/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco=
+github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17 h1:unGRxvM9OJBTsfDQg/AZCYOeJZ5TqrCsPphjWJ2wI94=
+github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco=
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=
diff --git a/tests/new-rg/main.tf b/tests/new-rg/main.tf
index d58e7f97..8b690292 100644
--- a/tests/new-rg/main.tf
+++ b/tests/new-rg/main.tf
@@ -4,7 +4,7 @@
module "resource_group" {
source = "terraform-ibm-modules/resource-group/ibm"
- version = "1.3.0"
+ version = "1.4.0"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group