From f08c0407875f7d9af9f68dd2e255a63178e51f62 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 9 Jan 2025 10:42:46 +0000 Subject: [PATCH] Update Terraform github.com/DFE-Digital/terraform-azurerm-key-vault-tfvars to v0.5.1 (#30) * Update Terraform github.com/DFE-Digital/terraform-azurerm-key-vault-tfvars to v0.5.1 * Updated readme --------- Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: Ash Davies <3853061+DrizzlyOwl@users.noreply.github.com> --- terraform/README.md | 6 +++--- terraform/key-vault-tfvars-secrets.tf | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/terraform/README.md b/terraform/README.md index efbc8bc..5a4a01e 100644 --- a/terraform/README.md +++ b/terraform/README.md @@ -12,13 +12,13 @@ | Name | Version | |------|---------| | [azapi](#provider\_azapi) | 1.14.0 | -| [azurerm](#provider\_azurerm) | 3.111.0 | +| [azurerm](#provider\_azurerm) | 3.113.0 | ## Modules | Name | Source | Version | |------|--------|---------| -| [azurerm\_key\_vault](#module\_azurerm\_key\_vault) | github.com/DFE-Digital/terraform-azurerm-key-vault-tfvars | v0.4.2 | +| [azurerm\_key\_vault](#module\_azurerm\_key\_vault) | github.com/DFE-Digital/terraform-azurerm-key-vault-tfvars | v0.5.1 | ## Resources @@ -55,7 +55,7 @@ | [api\_connection\_client\_secret](#input\_api\_connection\_client\_secret) | Service Principal Client Secret used for authenticating with the Container Instance | `string` | `""` | no | | [environment](#input\_environment) | Environment name | `string` | n/a | yes | | [key\_vault\_access\_ipv4](#input\_key\_vault\_access\_ipv4) | List of IPv4 Addresses that are permitted to access the Key Vault | `list(string)` | n/a | yes | -| [key\_vault\_targets](#input\_key\_vault\_targets) | List of Key Vault resource names and resource groups that you want the Scanner to be able to access |
map(object({
name = string
resource_group_name = string
}))
| `{}` | no | +| [key\_vault\_targets](#input\_key\_vault\_targets) | List of Key Vault resource names and resource groups that you want the Scanner to be able to access |
map(object({
name = string
resource_group_name = string
}))
| `{}` | no | | [registry\_password](#input\_registry\_password) | Password for authenticating to the Container Registry | `string` | `""` | no | | [registry\_server](#input\_registry\_server) | Hostname of the Container Registry | `string` | n/a | yes | | [registry\_username](#input\_registry\_username) | Username for authenticating to the Container Registry | `string` | `""` | no | diff --git a/terraform/key-vault-tfvars-secrets.tf b/terraform/key-vault-tfvars-secrets.tf index 7f68fea..b14f90c 100644 --- a/terraform/key-vault-tfvars-secrets.tf +++ b/terraform/key-vault-tfvars-secrets.tf @@ -1,5 +1,5 @@ module "azurerm_key_vault" { - source = "github.com/DFE-Digital/terraform-azurerm-key-vault-tfvars?ref=v0.4.2" + source = "github.com/DFE-Digital/terraform-azurerm-key-vault-tfvars?ref=v0.5.1" environment = local.environment project_name = "kvss"