File tree Expand file tree Collapse file tree 5 files changed +9
-9
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 5 files changed +9
-9
lines changed Original file line number Diff line number Diff line change @@ -30,7 +30,7 @@ module "secrets_manager_group" {
3030# Create the private cert
3131module "secrets_manager_private_certificate" {
3232 source = " terraform-ibm-modules/secrets-manager-private-cert/ibm"
33- version = " 1.3.3 "
33+ version = " 1.4.0 "
3434 cert_name = " ${ var . prefix } -cts-vpn-private-cert"
3535 cert_description = " an example private cert"
3636 cert_template = var. certificate_template_name
@@ -50,7 +50,7 @@ module "secrets_manager_private_certificate" {
5050# Minimal VPC for illustration purpose: 1 subnet across 1 availability zone
5151module "basic_vpc" {
5252 source = " terraform-ibm-modules/landing-zone-vpc/ibm"
53- version = " 7.25.3 "
53+ version = " 7.25.6 "
5454 resource_group_id = module. resource_group . resource_group_id
5555 region = var. region
5656 name = " vpc"
Original file line number Diff line number Diff line change @@ -54,7 +54,7 @@ module "private_secret_engine" {
5454 depends_on = [module . secrets_manager ]
5555 count = var. existing_sm_instance_guid == null ? 1 : 0
5656 source = " terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
57- version = " 1.5.5 "
57+ version = " 1.6.0 "
5858 secrets_manager_guid = local. sm_guid
5959 region = local. sm_region
6060 root_ca_name = var. root_ca_name
@@ -71,7 +71,7 @@ module "private_secret_engine" {
7171module "secrets_manager_private_certificate" {
7272 depends_on = [module . private_secret_engine ]
7373 source = " terraform-ibm-modules/secrets-manager-private-cert/ibm"
74- version = " 1.3.3 "
74+ version = " 1.4.0 "
7575 cert_name = " ${ var . prefix } -cts-vpn-private-cert"
7676 cert_description = " an example private cert"
7777 cert_template = var. certificate_template_name
@@ -91,7 +91,7 @@ module "secrets_manager_private_certificate" {
9191# Minimal VPC for illustration purpose: 2 subnets across 2 availability zones
9292module "basic_vpc" {
9393 source = " terraform-ibm-modules/landing-zone-vpc/ibm"
94- version = " 7.25.3 "
94+ version = " 7.25.6 "
9595 resource_group_id = module. resource_group . resource_group_id
9696 region = var. region
9797 name = " vpc"
Original file line number Diff line number Diff line change @@ -32,7 +32,7 @@ This solution supports provisioning and configuring the following infrastructure
3232| <a name =" module_existing_sm_crn_parser " ></a > [ existing\_ sm\_ crn\_ parser] ( #module\_ existing\_ sm\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
3333| <a name =" module_existing_vpc_crn_parser " ></a > [ existing\_ vpc\_ crn\_ parser] ( #module\_ existing\_ vpc\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
3434| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.1 |
35- | <a name =" module_secrets_manager_private_certificate " ></a > [ secrets\_ manager\_ private\_ certificate] ( #module\_ secrets\_ manager\_ private\_ certificate ) | terraform-ibm-modules/secrets-manager-private-cert/ibm | 1.3.3 |
35+ | <a name =" module_secrets_manager_private_certificate " ></a > [ secrets\_ manager\_ private\_ certificate] ( #module\_ secrets\_ manager\_ private\_ certificate ) | terraform-ibm-modules/secrets-manager-private-cert/ibm | 1.4.0 |
3636| <a name =" module_secrets_manager_secret_group " ></a > [ secrets\_ manager\_ secret\_ group] ( #module\_ secrets\_ manager\_ secret\_ group ) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.8 |
3737| <a name =" module_vpn " ></a > [ vpn] ( #module\_ vpn ) | ../.. | n/a |
3838
Original file line number Diff line number Diff line change @@ -45,7 +45,7 @@ module "secrets_manager_secret_group" {
4545module "secrets_manager_private_certificate" {
4646 count = var. existing_secrets_manager_cert_crn == null ? 1 : 0
4747 source = " terraform-ibm-modules/secrets-manager-private-cert/ibm"
48- version = " 1.3.3 "
48+ version = " 1.4.0 "
4949 cert_name = (var. prefix != null && var. prefix != " " ) ? " ${ var . prefix } -cts-vpn-private-cert" : " cts-vpn-private-cert"
5050 cert_description = " private certificate for client to site VPN connection"
5151 cert_template = var. private_cert_engine_config_template_name
Original file line number Diff line number Diff line change 44
55module "landing_zone" {
66 source = " terraform-ibm-modules/landing-zone/ibm//patterns//vpc//module"
7- version = " 8.2.2 "
7+ version = " 8.3.0 "
88 region = var. region
99 prefix = var. prefix
1010 tags = var. resource_tags
@@ -55,7 +55,7 @@ module "secrets_manager_group" {
5555module "secrets_manager_private_certificate" {
5656 count = var. existing_secrets_manager_instance_crn != null ? 1 : 0
5757 source = " terraform-ibm-modules/secrets-manager-private-cert/ibm"
58- version = " 1.3.3 "
58+ version = " 1.4.0 "
5959 cert_name = " ${ var . prefix } -cts-vpn-private-cert"
6060 cert_description = " an example private cert"
6161 cert_template = var. certificate_template_name
You can’t perform that action at this time.
0 commit comments