File tree Expand file tree Collapse file tree 5 files changed +7
-7
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 5 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ module "resource_group" {
1717# Create a secret group to place the certificate in
1818module "secrets_manager_group" {
1919 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
20- version = " 1.3.2 "
20+ version = " 1.3.3 "
2121 region = var. secrets_manager_region
2222 secrets_manager_guid = var. secrets_manager_guid
2323 secret_group_name = " ${ var . prefix } -certs"
@@ -50,7 +50,7 @@ module "secrets_manager_private_certificate" {
5050# Minimal VPC for illustration purpose: 1 subnet across 1 availability zone
5151module "basic_vpc" {
5252 source = " terraform-ibm-modules/landing-zone-vpc/ibm"
53- version = " 7.23.0 "
53+ version = " 7.23.1 "
5454 resource_group_id = module. resource_group . resource_group_id
5555 region = var. region
5656 name = " vpc"
Original file line number Diff line number Diff line change @@ -39,7 +39,7 @@ module "secrets_manager" {
3939# Create a secret group to place the certificate in
4040module "secrets_manager_group" {
4141 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
42- version = " 1.3.2 "
42+ version = " 1.3.3 "
4343 region = local. sm_region
4444 secrets_manager_guid = local. sm_guid
4545 secret_group_name = " ${ var . prefix } -certs"
@@ -91,7 +91,7 @@ module "secrets_manager_private_certificate" {
9191# Minimal VPC for illustration purpose: 2 subnets across 2 availability zones
9292module "basic_vpc" {
9393 source = " terraform-ibm-modules/landing-zone-vpc/ibm"
94- version = " 7.23.0 "
94+ version = " 7.23.1 "
9595 resource_group_id = module. resource_group . resource_group_id
9696 region = var. region
9797 name = " vpc"
Original file line number Diff line number Diff line change @@ -33,7 +33,7 @@ This solution supports provisioning and configuring the following infrastructure
3333| <a name =" module_existing_vpc_crn_parser " ></a > [ existing\_ vpc\_ crn\_ parser] ( #module\_ existing\_ vpc\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3434| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
3535| <a name =" module_secrets_manager_private_certificate " ></a > [ secrets\_ manager\_ private\_ certificate] ( #module\_ secrets\_ manager\_ private\_ certificate ) | terraform-ibm-modules/secrets-manager-private-cert/ibm | 1.3.3 |
36- | <a name =" module_secrets_manager_secret_group " ></a > [ secrets\_ manager\_ secret\_ group] ( #module\_ secrets\_ manager\_ secret\_ group ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.2 |
36+ | <a name =" module_secrets_manager_secret_group " ></a > [ secrets\_ manager\_ secret\_ group] ( #module\_ secrets\_ manager\_ secret\_ group ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.3 |
3737| <a name =" module_vpn " ></a > [ vpn] ( #module\_ vpn ) | ../.. | n/a |
3838
3939### Resources
Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ module "existing_secrets_manager_cert_crn_parser" {
3131module "secrets_manager_secret_group" {
3232 count = var. existing_secrets_manager_cert_crn == null && var. existing_secrets_manager_secret_group_id == null ? 1 : 0
3333 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
34- version = " 1.3.2 "
34+ version = " 1.3.3 "
3535 region = module. existing_sm_crn_parser . region
3636 secrets_manager_guid = module. existing_sm_crn_parser . service_instance
3737 secret_group_name = (var. prefix != null && var. prefix != " " ) ? " ${ var . prefix } -cert-secret-group" : " cert-secret-group"
Original file line number Diff line number Diff line change @@ -41,7 +41,7 @@ module "existing_sm_crn_parser" {
4141module "secrets_manager_group" {
4242 count = var. existing_secrets_manager_instance_crn != null ? 1 : 0
4343 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
44- version = " 1.3.2 "
44+ version = " 1.3.3 "
4545 region = local. sm_region
4646 secrets_manager_guid = local. secrets_manager_guid
4747 secret_group_name = " ${ var . prefix } -cert-secret-group"
You can’t perform that action at this time.
0 commit comments