From 78bcc2acfe2a17ff83863473e2ff39ada5e9e618 Mon Sep 17 00:00:00 2001 From: Terraform IBM Modules Operations Date: Sat, 25 Oct 2025 19:40:45 +0000 Subject: [PATCH] fix(deps): update dependencies --- common-dev-assets | 2 +- examples/basic/main.tf | 4 ++-- examples/ha-complete/main.tf | 8 ++++---- solutions/fully-configurable/main.tf | 2 +- solutions/fully-configurable/version.tf | 2 +- tests/resources/main.tf | 2 +- 6 files changed, 10 insertions(+), 10 deletions(-) diff --git a/common-dev-assets b/common-dev-assets index 1df43f2d..ae23e021 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit 1df43f2daf97a529d05350408d32a12f50d89fbf +Subproject commit ae23e021950779a9c0612e71ce51d074f14b7543 diff --git a/examples/basic/main.tf b/examples/basic/main.tf index 9be4c07a..d3b3b1cf 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -30,7 +30,7 @@ module "secrets_manager_group" { # Create the private cert module "secrets_manager_private_certificate" { source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.6.1" + version = "1.7.0" cert_name = "${var.prefix}-cts-vpn-private-cert" cert_description = "an example private cert" cert_template = var.certificate_template_name @@ -50,7 +50,7 @@ module "secrets_manager_private_certificate" { # Minimal VPC for illustration purpose: 1 subnet across 1 availability zone module "basic_vpc" { source = "terraform-ibm-modules/landing-zone-vpc/ibm" - version = "8.6.0" + version = "8.7.0" resource_group_id = module.resource_group.resource_group_id region = var.region name = "vpc" diff --git a/examples/ha-complete/main.tf b/examples/ha-complete/main.tf index fece9bd4..f9faf457 100644 --- a/examples/ha-complete/main.tf +++ b/examples/ha-complete/main.tf @@ -26,7 +26,7 @@ module "resource_group" { # Create a new SM instance if not using an existing one module "secrets_manager" { source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.10.3" + version = "2.11.3" count = var.existing_sm_instance_guid == null ? 1 : 0 resource_group_id = module.resource_group.resource_group_id region = local.sm_region @@ -54,7 +54,7 @@ module "private_secret_engine" { depends_on = [module.secrets_manager] count = var.existing_sm_instance_guid == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm" - version = "1.9.4" + version = "1.10.2" secrets_manager_guid = local.sm_guid region = local.sm_region root_ca_name = var.root_ca_name @@ -71,7 +71,7 @@ module "private_secret_engine" { module "secrets_manager_private_certificate" { depends_on = [module.private_secret_engine] source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.6.1" + version = "1.7.0" cert_name = "${var.prefix}-cts-vpn-private-cert" cert_description = "an example private cert" cert_template = var.certificate_template_name @@ -91,7 +91,7 @@ module "secrets_manager_private_certificate" { # Minimal VPC for illustration purpose: 2 subnets across 2 availability zones module "basic_vpc" { source = "terraform-ibm-modules/landing-zone-vpc/ibm" - version = "8.6.0" + version = "8.7.0" resource_group_id = module.resource_group.resource_group_id region = var.region name = "vpc" diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 1810a8c6..fe99e159 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -45,7 +45,7 @@ module "secrets_manager_secret_group" { module "secrets_manager_private_certificate" { count = var.existing_secrets_manager_cert_crn == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.6.1" + version = "1.7.0" cert_name = (var.prefix != null && var.prefix != "") ? "${var.prefix}-cts-vpn-private-cert" : "cts-vpn-private-cert" cert_description = "private certificate for client to site VPN connection" cert_template = var.private_cert_engine_config_template_name diff --git a/solutions/fully-configurable/version.tf b/solutions/fully-configurable/version.tf index bdc631d3..5cf449f4 100644 --- a/solutions/fully-configurable/version.tf +++ b/solutions/fully-configurable/version.tf @@ -4,7 +4,7 @@ terraform { # Locking into an exact version for a deployable architecture ibm = { source = "IBM-Cloud/ibm" - version = "1.84.1" + version = "1.84.3" } time = { source = "hashicorp/time" diff --git a/tests/resources/main.tf b/tests/resources/main.tf index 8b33b8a8..fe628927 100644 --- a/tests/resources/main.tf +++ b/tests/resources/main.tf @@ -55,7 +55,7 @@ module "secrets_manager_group" { module "secrets_manager_private_certificate" { count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.6.1" + version = "1.7.0" cert_name = "${var.prefix}-cts-vpn-private-cert" cert_description = "an example private cert" cert_template = var.certificate_template_name