Skip to content

Commit 3969896

Browse files
committed
update
1 parent 7594159 commit 3969896

File tree

3 files changed

+3
-41
lines changed

3 files changed

+3
-41
lines changed

modules/kube-audit/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ No modules.
8484
| <a name="input_audit_log_policy"></a> [audit\_log\_policy](#input\_audit\_log\_policy) | Specify the amount of information that is logged to the API server audit logs by choosing the audit log policy profile to use. Supported values are `default` and `WriteRequestBodies`. | `string` | `"default"` | no |
8585
| <a name="input_audit_namespace"></a> [audit\_namespace](#input\_audit\_namespace) | The name of the namespace where log collection service and a deployment will be created. | `string` | `"ibm-kube-audit"` | no |
8686
| <a name="input_audit_webhook_listener_image"></a> [audit\_webhook\_listener\_image](#input\_audit\_webhook\_listener\_image) | The audit webhook listener image reference in the format of `[registry-url]/[namespace]/[image]`.The sub-module uses the `icr.io/ibm/ibmcloud-kube-audit-to-ibm-cloud-logs` image to forward logs to IBM Cloud Logs. This image is for demonstration purposes only. For a production solution, configure and maintain your own log forwarding image. | `string` | `"icr.io/ibm/ibmcloud-kube-audit-to-ibm-cloud-logs"` | no |
87-
| <a name="input_audit_webhook_listener_image_version"></a> [audit\_webhook\_listener\_image\_version](#input\_audit\_webhook\_listener\_image\_version) | The tag or digest for the audit webhook listener image to deploy. If changing the value, ensure it is compatible with `audit_webhook_listener_image`. | `string` | `"122e7a6c887ef24fea3095518857a708bd84b1e4@sha256:04c08891cd0201e11ecc6fe4f7b016ed137989010ced987cab57be5c7af3915a"` | no |
87+
| <a name="input_audit_webhook_listener_image_version"></a> [audit\_webhook\_listener\_image\_version](#input\_audit\_webhook\_listener\_image\_version) | The tag or digest for the audit webhook listener image to deploy. If changing the value, ensure it is compatible with `audit_webhook_listener_image`. | `string` | `"deaabcb8225e800385413ba420cf3f819d3b0671@sha256:acf123f4dba63534cbc104c6886abedff9d25a22a34ab7b549ede988ed6e7144"` | no |
8888
| <a name="input_cluster_config_endpoint_type"></a> [cluster\_config\_endpoint\_type](#input\_cluster\_config\_endpoint\_type) | Specify which type of endpoint to use for for cluster config access: 'default', 'private', 'vpe', 'link'. 'default' value will use the default endpoint of the cluster. | `string` | `"default"` | no |
8989
| <a name="input_cluster_id"></a> [cluster\_id](#input\_cluster\_id) | The ID of the cluster to deploy the log collection service in. | `string` | n/a | yes |
9090
| <a name="input_cluster_resource_group_id"></a> [cluster\_resource\_group\_id](#input\_cluster\_resource\_group\_id) | The resource group ID of the cluster. | `string` | n/a | yes |

modules/kube-audit/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ variable "audit_webhook_listener_image_version" {
9595
type = string
9696
description = "The tag or digest for the audit webhook listener image to deploy. If changing the value, ensure it is compatible with `audit_webhook_listener_image`."
9797
nullable = false
98-
default = "122e7a6c887ef24fea3095518857a708bd84b1e4@sha256:04c08891cd0201e11ecc6fe4f7b016ed137989010ced987cab57be5c7af3915a" # datasource: icr.io/ibm/ibmcloud-kube-audit-to-ibm-cloud-logs
98+
default = "deaabcb8225e800385413ba420cf3f819d3b0671@sha256:acf123f4dba63534cbc104c6886abedff9d25a22a34ab7b549ede988ed6e7144" # See, https://github.ibm.com/GoldenEye/issues/issues/13371
9999
validation {
100100
condition = can(regex("^[a-f0-9]{40}@sha256:[a-f0-9]{64}$", var.audit_webhook_listener_image_version))
101101
error_message = "The value of the audit webhook listener image version must match the tag and sha256 image digest format"

renovate.json

Lines changed: 1 addition & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,4 @@
11
{
22
"$schema": "https://docs.renovatebot.com/renovate-schema.json",
3-
"extends": ["github>terraform-ibm-modules/common-dev-assets:commonRenovateConfig"],
4-
"customManagers": [
5-
{
6-
"customType": "regex",
7-
"description": "Update docker image digest to latest in variables.tf",
8-
"fileMatch": ["variables.tf$"],
9-
"datasourceTemplate": "docker",
10-
"matchStrings": [
11-
"default\\s*=\\s*\"(?<currentValue>[a-f0-9]+)@(?<currentDigest>sha256:[a-f0-9]+)\"\\s*# datasource: (?<depName>[^\\s]+)"
12-
]
13-
},
14-
{
15-
"customType": "regex",
16-
"description": "Update helm chart version to latest in variables.tf",
17-
"fileMatch": ["variables.tf$"],
18-
"matchStrings": [
19-
"datasource=(?<datasource>.*?) depName=(?<depName>.*?)( versioning=(?<versioning>.*?))?\\s.*?default\\s*=\\s*\"(?<currentValue>.*)\"\\s"
20-
],
21-
"versioningTemplate": "{{#if versioning}}{{{versioning}}}{{else}}semver{{/if}}"
22-
}
23-
],
24-
"packageRules": [
25-
{
26-
"matchManagers": ["regex"],
27-
"matchUpdateTypes": ["patch"],
28-
"semanticCommitType": "fix"
29-
},
30-
{
31-
"matchManagers": ["regex"],
32-
"matchUpdateTypes": ["minor"],
33-
"semanticCommitType": "feat"
34-
},
35-
{
36-
"description": "Do not allow major version updates - these should be done manually to ensure no breaking changes",
37-
"matchManagers": ["regex"],
38-
"matchUpdateTypes": ["major"],
39-
"enabled": false
40-
}
41-
]
3+
"extends": ["github>terraform-ibm-modules/common-dev-assets:commonRenovateConfig"]
424
}

0 commit comments

Comments
 (0)