@@ -39,7 +39,7 @@ module "secrets_manager" {
3939# Create a secret group to place the certificate in
4040module "secrets_manager_group" {
4141 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
42- version = " 1.2.3 "
42+ version = " 1.3.2 "
4343 region = local. sm_region
4444 secrets_manager_guid = local. sm_guid
4545 secret_group_name = " ${ var . prefix } -certs"
@@ -54,7 +54,7 @@ module "private_secret_engine" {
5454 depends_on = [module . secrets_manager ]
5555 count = var. existing_sm_instance_guid == null ? 1 : 0
5656 source = " terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
57- version = " 1.3.5 "
57+ version = " 1.3.6 "
5858 secrets_manager_guid = local. sm_guid
5959 region = local. sm_region
6060 root_ca_name = var. root_ca_name
@@ -71,7 +71,7 @@ module "private_secret_engine" {
7171module "secrets_manager_private_certificate" {
7272 depends_on = [module . private_secret_engine ]
7373 source = " terraform-ibm-modules/secrets-manager-private-cert/ibm"
74- version = " 1.3.2 "
74+ version = " 1.3.3 "
7575 cert_name = " ${ var . prefix } -cts-vpn-private-cert"
7676 cert_description = " an example private cert"
7777 cert_template = var. certificate_template_name
@@ -91,7 +91,7 @@ module "secrets_manager_private_certificate" {
9191# Minimal VPC for illustration purpose: 2 subnets across 2 availability zones
9292module "basic_vpc" {
9393 source = " terraform-ibm-modules/landing-zone-vpc/ibm"
94- version = " 7.20 .2"
94+ version = " 7.22 .2"
9595 resource_group_id = module. resource_group . resource_group_id
9696 region = var. region
9797 name = " vpc"
0 commit comments