File tree Expand file tree Collapse file tree 5 files changed +7
-7
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 5 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ module "resource_group" {
1717# Create a secret group to place the certificate in
1818module "secrets_manager_group" {
1919 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
20- version = " 1.3.9 "
20+ version = " 1.3.10 "
2121 region = var. secrets_manager_region
2222 secrets_manager_guid = var. secrets_manager_guid
2323 secret_group_name = " ${ var . prefix } -certs"
Original file line number Diff line number Diff line change @@ -26,7 +26,7 @@ module "resource_group" {
2626# Create a new SM instance if not using an existing one
2727module "secrets_manager" {
2828 source = " terraform-ibm-modules/secrets-manager/ibm"
29- version = " 2.6.8 "
29+ version = " 2.6.10 "
3030 count = var. existing_sm_instance_guid == null ? 1 : 0
3131 resource_group_id = module. resource_group . resource_group_id
3232 region = local. sm_region
@@ -39,7 +39,7 @@ module "secrets_manager" {
3939# Create a secret group to place the certificate in
4040module "secrets_manager_group" {
4141 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
42- version = " 1.3.9 "
42+ version = " 1.3.10 "
4343 region = local. sm_region
4444 secrets_manager_guid = local. sm_guid
4545 secret_group_name = " ${ var . prefix } -certs"
@@ -54,7 +54,7 @@ module "private_secret_engine" {
5454 depends_on = [module . secrets_manager ]
5555 count = var. existing_sm_instance_guid == null ? 1 : 0
5656 source = " terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
57- version = " 1.6.1 "
57+ version = " 1.6.2 "
5858 secrets_manager_guid = local. sm_guid
5959 region = local. sm_region
6060 root_ca_name = var. root_ca_name
Original file line number Diff line number Diff line change @@ -33,7 +33,7 @@ This solution supports provisioning and configuring the following infrastructure
3333| <a name =" module_existing_vpc_crn_parser " ></a > [ existing\_ vpc\_ crn\_ parser] ( #module\_ existing\_ vpc\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
3434| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.1 |
3535| <a name =" module_secrets_manager_private_certificate " ></a > [ secrets\_ manager\_ private\_ certificate] ( #module\_ secrets\_ manager\_ private\_ certificate ) | terraform-ibm-modules/secrets-manager-private-cert/ibm | 1.4.0 |
36- | <a name =" module_secrets_manager_secret_group " ></a > [ secrets\_ manager\_ secret\_ group] ( #module\_ secrets\_ manager\_ secret\_ group ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.9 |
36+ | <a name =" module_secrets_manager_secret_group " ></a > [ secrets\_ manager\_ secret\_ group] ( #module\_ secrets\_ manager\_ secret\_ group ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.10 |
3737| <a name =" module_vpn " ></a > [ vpn] ( #module\_ vpn ) | ../.. | n/a |
3838
3939### Resources
Original file line number Diff line number Diff line change @@ -31,7 +31,7 @@ module "existing_secrets_manager_cert_crn_parser" {
3131module "secrets_manager_secret_group" {
3232 count = var. existing_secrets_manager_cert_crn == null && var. existing_secrets_manager_secret_group_id == null ? 1 : 0
3333 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
34- version = " 1.3.9 "
34+ version = " 1.3.10 "
3535 region = module. existing_sm_crn_parser . region
3636 secrets_manager_guid = module. existing_sm_crn_parser . service_instance
3737 secret_group_name = (var. prefix != null && var. prefix != " " ) ? " ${ var . prefix } -cert-secret-group" : " cert-secret-group"
Original file line number Diff line number Diff line change @@ -41,7 +41,7 @@ module "existing_sm_crn_parser" {
4141module "secrets_manager_group" {
4242 count = var. existing_secrets_manager_instance_crn != null ? 1 : 0
4343 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
44- version = " 1.3.9 "
44+ version = " 1.3.10 "
4545 region = local. sm_region
4646 secrets_manager_guid = local. secrets_manager_guid
4747 secret_group_name = " ${ var . prefix } -cert-secret-group"
You can’t perform that action at this time.
0 commit comments