diff --git a/examples/basic/main.tf b/examples/basic/main.tf index afd05f7e..3e825da4 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -30,7 +30,7 @@ module "secrets_manager_group" { # Create the private cert module "secrets_manager_private_certificate" { source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.3.1" + version = "1.3.2" cert_name = "${var.prefix}-cts-vpn-private-cert" cert_description = "an example private cert" cert_template = var.certificate_template_name @@ -50,7 +50,7 @@ module "secrets_manager_private_certificate" { # Minimal VPC for illustration purpose: 1 subnet across 1 availability zone module "basic_vpc" { source = "terraform-ibm-modules/landing-zone-vpc/ibm" - version = "7.19.0" + version = "7.19.1" resource_group_id = module.resource_group.resource_group_id region = var.region name = "vpc" diff --git a/examples/ha-complete/main.tf b/examples/ha-complete/main.tf index 3212079f..e6032d1e 100644 --- a/examples/ha-complete/main.tf +++ b/examples/ha-complete/main.tf @@ -26,7 +26,7 @@ module "resource_group" { # Create a new SM instance if not using an existing one module "secrets_manager" { source = "terraform-ibm-modules/secrets-manager/ibm" - version = "1.18.3" + version = "1.19.6" count = var.existing_sm_instance_guid == null ? 1 : 0 resource_group_id = module.resource_group.resource_group_id region = local.sm_region @@ -54,7 +54,7 @@ module "private_secret_engine" { depends_on = [module.secrets_manager] count = var.existing_sm_instance_guid == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm" - version = "1.3.2" + version = "1.3.4" secrets_manager_guid = local.sm_guid region = local.sm_region root_ca_name = var.root_ca_name @@ -71,7 +71,7 @@ module "private_secret_engine" { module "secrets_manager_private_certificate" { depends_on = [module.private_secret_engine] source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.3.1" + version = "1.3.2" cert_name = "${var.prefix}-cts-vpn-private-cert" cert_description = "an example private cert" cert_template = var.certificate_template_name @@ -91,7 +91,7 @@ module "secrets_manager_private_certificate" { # Minimal VPC for illustration purpose: 2 subnets across 2 availability zones module "basic_vpc" { source = "terraform-ibm-modules/landing-zone-vpc/ibm" - version = "7.19.0" + version = "7.19.1" resource_group_id = module.resource_group.resource_group_id region = var.region name = "vpc" diff --git a/solutions/quickstart/main.tf b/solutions/quickstart/main.tf index d3d12dfa..c99f7dc1 100644 --- a/solutions/quickstart/main.tf +++ b/solutions/quickstart/main.tf @@ -18,7 +18,7 @@ locals { module "existing_sm_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.0.0" + version = "1.1.0" crn = var.existing_secrets_manager_instance_crn } @@ -38,7 +38,7 @@ module "secrets_manager_secret_group" { # Create private certificate to use for VPN server module "secrets_manager_private_certificate" { source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.3.1" + version = "1.3.2" cert_name = (var.prefix != null && var.prefix != "") ? "${var.prefix}-cts-vpn-private-cert" : "cts-vpn-private-cert" cert_description = "private certificate for client to site VPN connection" cert_template = var.certificate_template_name @@ -81,7 +81,7 @@ locals { module "existing_vpc_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.0.0" + version = "1.1.0" crn = var.existing_vpc_crn } diff --git a/solutions/standard/main.tf b/solutions/standard/main.tf index 54529187..3153b207 100644 --- a/solutions/standard/main.tf +++ b/solutions/standard/main.tf @@ -20,14 +20,14 @@ locals { } module "existing_sm_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.0.0" + version = "1.1.0" crn = var.existing_secrets_manager_instance_crn } module "existing_secrets_manager_cert_crn_parser" { count = var.existing_secrets_manager_cert_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.0.0" + version = "1.1.0" crn = var.existing_secrets_manager_cert_crn } @@ -49,7 +49,7 @@ module "secrets_manager_secret_group" { module "secrets_manager_private_certificate" { count = var.existing_secrets_manager_cert_crn == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.3.1" + version = "1.3.2" cert_name = (var.prefix != null && var.prefix != "") ? "${var.prefix}-cts-vpn-private-cert" : "cts-vpn-private-cert" cert_description = "private certificate for client to site VPN connection" cert_template = var.certificate_template_name @@ -209,7 +209,7 @@ locals { module "existing_vpc_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.0.0" + version = "1.1.0" crn = var.existing_vpc_crn } diff --git a/tests/resources/main.tf b/tests/resources/main.tf index c64163e2..0d2cfd02 100644 --- a/tests/resources/main.tf +++ b/tests/resources/main.tf @@ -4,7 +4,7 @@ module "landing_zone" { source = "terraform-ibm-modules/landing-zone/ibm//patterns//vpc//module" - version = "6.2.2" + version = "6.6.2" region = var.region prefix = var.prefix tags = var.resource_tags @@ -33,7 +33,7 @@ locals { module "existing_sm_crn_parser" { count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.0.0" + version = "1.1.0" crn = var.existing_secrets_manager_instance_crn } @@ -55,7 +55,7 @@ module "secrets_manager_group" { module "secrets_manager_private_certificate" { count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.3.1" + version = "1.3.2" cert_name = "${var.prefix}-cts-vpn-private-cert" cert_description = "an example private cert" cert_template = var.certificate_template_name