Skip to content

Releases: terraform-ibm-modules/terraform-ibm-secrets-manager

v2.2.5

03 May 23:20
v2.2.5
29fa311
Compare
Choose a tag to compare

2.2.5 (2025-05-03)

Bug Fixes

  • deps: update terraform terraform-ibm-modules/kms-all-inclusive/ibm to v5 (#324) (29fa311)

v2.2.4

03 May 15:24
v2.2.4
047169a
Compare
Choose a tag to compare

2.2.4 (2025-05-03)

Bug Fixes

v2.2.3

28 Apr 02:12
v2.2.3
58d92eb
Compare
Choose a tag to compare

2.2.3 (2025-04-28)

Bug Fixes

  • deps: update terraform terraform-ibm-modules/secrets-manager/ibm to v2.2.2 (#326) (58d92eb)

v2.2.2

27 Apr 19:59
v2.2.2
b1862c1
Compare
Choose a tag to compare

2.2.2 (2025-04-27)

Bug Fixes

v2.2.1

27 Apr 02:38
v2.2.1
d8cf80d
Compare
Choose a tag to compare

2.2.1 (2025-04-27)

Bug Fixes

v2.2.0

25 Apr 16:18
v2.2.0
6a2b6fa
Compare
Choose a tag to compare

2.2.0 (2025-04-25)

Features

  • deps: updated required terraform version to >=1.9.0 and updated variable validation logic (#319) (6a2b6fa)

v2.1.1

03 Apr 15:14
v2.1.1
66fa626
Compare
Choose a tag to compare

2.1.1 (2025-04-03)

Bug Fixes

v1.26.4

02 Apr 09:41
Compare
Choose a tag to compare

1.26.4 (2025-04-02)

Fixes

  • added the missing input skip_iam_authorization_policy from the DA. Previously this was automatically set to false with no ability to override in the DA, meaning you might get an error if passing an existing Secrets Manager instance if the auth policy already exists. Exposing it now allows consumers to disable auth policy creation if it already exists.

v2.1.0

01 Apr 15:24
v2.1.0
600945c
Compare
Choose a tag to compare

2.1.0 (2025-04-01)

Features

  • added new input secret_groups which supports creating secret groups, and associated IAM access groups. By default it will create a group called General with an associated access group called general-secrets-group-access-group which will have SecretsReader role. (#314) (600945c)

v1.26.3

01 Apr 09:46
Compare
Choose a tag to compare

1.26.3 (2025-04-01)

Fixes

  • added a fix to KMS key validation that was causing the following error when passing an existing Secrets Manager instance:

    │ Error: Invalid function argument
    │ 
    │   on ../../main.tf line 21, in locals:
    │   21:   validate_is_hpcs_key = var.is_hpcs_key && local.kms_service_name != "hs-crypto" ? tobool("When is_hpcs_key is set to true then the key provided through kms_key_crn must be a Hyper Protect Crypto Services key") : true
    │     ├────────────────
    │     │ while calling tobool(v)
    │ 
    │ Invalid value for "v" parameter: cannot convert "When is_hpcs_key is set to true then the key provided through kms_key_crn must be a Hyper Protect Crypto Services key" to bool; only the strings
    │ "true" or "false" are allowed.