Skip to content

Commit 6e4c401

Browse files
fix(deps): update terraform dependencies (#466)
1 parent 44d5223 commit 6e4c401

File tree

5 files changed

+9
-9
lines changed

5 files changed

+9
-9
lines changed

examples/basic/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ module "secrets_manager_group" {
3030
# Create the private cert
3131
module "secrets_manager_private_certificate" {
3232
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
33-
version = "1.4.0"
33+
version = "1.4.1"
3434
cert_name = "${var.prefix}-cts-vpn-private-cert"
3535
cert_description = "an example private cert"
3636
cert_template = var.certificate_template_name
@@ -50,7 +50,7 @@ module "secrets_manager_private_certificate" {
5050
# Minimal VPC for illustration purpose: 1 subnet across 1 availability zone
5151
module "basic_vpc" {
5252
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
53-
version = "7.25.11"
53+
version = "7.25.12"
5454
resource_group_id = module.resource_group.resource_group_id
5555
region = var.region
5656
name = "vpc"

examples/ha-complete/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ module "resource_group" {
2626
# Create a new SM instance if not using an existing one
2727
module "secrets_manager" {
2828
source = "terraform-ibm-modules/secrets-manager/ibm"
29-
version = "2.6.15"
29+
version = "2.6.16"
3030
count = var.existing_sm_instance_guid == null ? 1 : 0
3131
resource_group_id = module.resource_group.resource_group_id
3232
region = local.sm_region
@@ -54,7 +54,7 @@ module "private_secret_engine" {
5454
depends_on = [module.secrets_manager]
5555
count = var.existing_sm_instance_guid == null ? 1 : 0
5656
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
57-
version = "1.6.3"
57+
version = "1.6.4"
5858
secrets_manager_guid = local.sm_guid
5959
region = local.sm_region
6060
root_ca_name = var.root_ca_name
@@ -71,7 +71,7 @@ module "private_secret_engine" {
7171
module "secrets_manager_private_certificate" {
7272
depends_on = [module.private_secret_engine]
7373
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
74-
version = "1.4.0"
74+
version = "1.4.1"
7575
cert_name = "${var.prefix}-cts-vpn-private-cert"
7676
cert_description = "an example private cert"
7777
cert_template = var.certificate_template_name
@@ -91,7 +91,7 @@ module "secrets_manager_private_certificate" {
9191
# Minimal VPC for illustration purpose: 2 subnets across 2 availability zones
9292
module "basic_vpc" {
9393
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
94-
version = "7.25.11"
94+
version = "7.25.12"
9595
resource_group_id = module.resource_group.resource_group_id
9696
region = var.region
9797
name = "vpc"

solutions/fully-configurable/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ This solution supports provisioning and configuring the following infrastructure
3232
| <a name="module_existing_sm_crn_parser"></a> [existing\_sm\_crn\_parser](#module\_existing\_sm\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
3333
| <a name="module_existing_vpc_crn_parser"></a> [existing\_vpc\_crn\_parser](#module\_existing\_vpc\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
3434
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.1 |
35-
| <a name="module_secrets_manager_private_certificate"></a> [secrets\_manager\_private\_certificate](#module\_secrets\_manager\_private\_certificate) | terraform-ibm-modules/secrets-manager-private-cert/ibm | 1.4.0 |
35+
| <a name="module_secrets_manager_private_certificate"></a> [secrets\_manager\_private\_certificate](#module\_secrets\_manager\_private\_certificate) | terraform-ibm-modules/secrets-manager-private-cert/ibm | 1.4.1 |
3636
| <a name="module_secrets_manager_secret_group"></a> [secrets\_manager\_secret\_group](#module\_secrets\_manager\_secret\_group) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.11 |
3737
| <a name="module_vpn"></a> [vpn](#module\_vpn) | ../.. | n/a |
3838

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ module "secrets_manager_secret_group" {
4545
module "secrets_manager_private_certificate" {
4646
count = var.existing_secrets_manager_cert_crn == null ? 1 : 0
4747
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
48-
version = "1.4.0"
48+
version = "1.4.1"
4949
cert_name = (var.prefix != null && var.prefix != "") ? "${var.prefix}-cts-vpn-private-cert" : "cts-vpn-private-cert"
5050
cert_description = "private certificate for client to site VPN connection"
5151
cert_template = var.private_cert_engine_config_template_name

tests/resources/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ module "secrets_manager_group" {
5555
module "secrets_manager_private_certificate" {
5656
count = var.existing_secrets_manager_instance_crn != null ? 1 : 0
5757
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
58-
version = "1.4.0"
58+
version = "1.4.1"
5959
cert_name = "${var.prefix}-cts-vpn-private-cert"
6060
cert_description = "an example private cert"
6161
cert_template = var.certificate_template_name

0 commit comments

Comments
 (0)