Skip to content

Commit b3ebb7c

Browse files
fix(deps): update dependencies (#811)
1 parent 274cea1 commit b3ebb7c

File tree

16 files changed

+44
-41
lines changed

16 files changed

+44
-41
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ on:
77
- created
88
jobs:
99
call-terraform-ci-pipeline:
10-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.22.5
10+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.23.2
1111
secrets: inherit
1212
with:
1313
craSCCv2: true

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.22.5
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.23.2
1212
secrets: inherit

README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -246,12 +246,12 @@ Optionally, you need the following permissions to attach Access Management tags
246246
247247
| Name | Source | Version |
248248
|------|--------|---------|
249-
| <a name="module_attach_sg_to_api_vpe"></a> [attach\_sg\_to\_api\_vpe](#module\_attach\_sg\_to\_api\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
250-
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
251-
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
252-
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
249+
| <a name="module_attach_sg_to_api_vpe"></a> [attach\_sg\_to\_api\_vpe](#module\_attach\_sg\_to\_api\_vpe) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
250+
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
251+
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
252+
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
253253
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.2 |
254-
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 10.2.21 |
254+
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 10.4.0 |
255255
| <a name="module_existing_secrets_manager_instance_parser"></a> [existing\_secrets\_manager\_instance\_parser](#module\_existing\_secrets\_manager\_instance\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
256256
257257
### Resources

examples/advanced/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ locals {
2222

2323
module "kp_all_inclusive" {
2424
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
25-
version = "5.2.0"
25+
version = "5.3.0"
2626
key_protect_instance_name = "${var.prefix}-kp-instance"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region
@@ -211,7 +211,7 @@ locals {
211211

212212
module "cloud_logs" {
213213
source = "terraform-ibm-modules/cloud-logs/ibm"
214-
version = "1.6.29"
214+
version = "1.7.1"
215215
resource_group_id = module.resource_group.resource_group_id
216216
region = var.region
217217
plan = "standard"
@@ -247,7 +247,7 @@ module "trusted_profile" {
247247
module "logs_agents" {
248248
depends_on = [module.kube_audit]
249249
source = "terraform-ibm-modules/logs-agent/ibm"
250-
version = "1.7.2"
250+
version = "1.8.0"
251251
cluster_id = module.ocp_base.cluster_id
252252
cluster_resource_group_id = module.resource_group.resource_group_id
253253
logs_agent_trusted_profile_id = module.trusted_profile.trusted_profile.id

examples/custom_sg/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ locals {
8585
module "custom_sg" {
8686
for_each = toset(["custom-cluster-sg", "custom-worker-pool-sg", "custom-lb-sg", "custom-master-vpe-sg", "custom-registry-vpe-sg", "custom-kube-api-vpe-sg"])
8787
source = "terraform-ibm-modules/security-group/ibm"
88-
version = "2.7.0"
88+
version = "2.8.0"
8989
add_ibm_cloud_internal_rules = false
9090
security_group_name = each.key
9191
security_group_rules = []

examples/fscloud/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "cos_fscloud" {
1818
source = "terraform-ibm-modules/cos/ibm"
19-
version = "10.2.21"
19+
version = "10.4.0"
2020
resource_group_id = module.resource_group.resource_group_id
2121
create_cos_bucket = false
2222
cos_instance_name = "${var.prefix}-cos"
@@ -30,7 +30,7 @@ module "cos_fscloud" {
3030

3131
module "flowlogs_bucket" {
3232
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
33-
version = "10.2.21"
33+
version = "10.4.0"
3434

3535
bucket_configs = [
3636
{
@@ -52,7 +52,7 @@ module "flowlogs_bucket" {
5252
module "vpc" {
5353
depends_on = [module.flowlogs_bucket]
5454
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
55-
version = "8.3.0"
55+
version = "8.5.0"
5656
resource_group_id = module.resource_group.resource_group_id
5757
region = var.region
5858
prefix = var.prefix
@@ -225,7 +225,7 @@ locals {
225225
module "custom_sg" {
226226
for_each = toset(["custom-lb-sg"])
227227
source = "terraform-ibm-modules/security-group/ibm"
228-
version = "2.7.0"
228+
version = "2.8.0"
229229
add_ibm_cloud_internal_rules = false
230230
security_group_name = each.key
231231
security_group_rules = []

examples/multiple_mzr_clusters/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ data "ibm_container_cluster_config" "cluster_config_c2" {
173173

174174
module "monitoring_instance" {
175175
source = "terraform-ibm-modules/cloud-monitoring/ibm"
176-
version = "1.7.2"
176+
version = "1.8.1"
177177
resource_group_id = module.resource_group.resource_group_id
178178
region = var.region
179179
plan = "graduated-tier"
@@ -190,7 +190,7 @@ module "monitoring_agent_1" {
190190
helm = helm.helm_cluster_1
191191
}
192192
source = "terraform-ibm-modules/monitoring-agent/ibm"
193-
version = "1.8.4"
193+
version = "1.9.2"
194194
cluster_id = module.ocp_base_cluster_1.cluster_id
195195
cluster_resource_group_id = module.resource_group.resource_group_id
196196
access_key = module.monitoring_instance.access_key
@@ -202,7 +202,7 @@ module "monitoring_agent_2" {
202202
helm = helm.helm_cluster_2
203203
}
204204
source = "terraform-ibm-modules/monitoring-agent/ibm"
205-
version = "1.8.4"
205+
version = "1.9.2"
206206
cluster_id = module.ocp_base_cluster_2.cluster_id
207207
cluster_resource_group_id = module.resource_group.resource_group_id
208208
access_key = module.monitoring_instance.access_key

main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ module "cos_instance" {
100100
count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0
101101

102102
source = "terraform-ibm-modules/cos/ibm"
103-
version = "10.2.21"
103+
version = "10.4.0"
104104
cos_instance_name = local.cos_name
105105
resource_group_id = var.resource_group_id
106106
cos_plan = local.cos_plan
@@ -586,7 +586,7 @@ locals {
586586
module "attach_sg_to_lb" {
587587
count = length(var.additional_lb_security_group_ids)
588588
source = "terraform-ibm-modules/security-group/ibm"
589-
version = "2.7.0"
589+
version = "2.8.0"
590590
existing_security_group_id = var.additional_lb_security_group_ids[count.index]
591591
use_existing_security_group_id = true
592592
target_ids = [for index in range(var.number_of_lbs) : local.lbs_associated_with_cluster[index]] # number_of_lbs is necessary to give a static number of elements to tf to accomplish the apply when the cluster does not initially exists
@@ -637,7 +637,7 @@ locals {
637637
module "attach_sg_to_master_vpe" {
638638
count = length(var.additional_vpe_security_group_ids["master"])
639639
source = "terraform-ibm-modules/security-group/ibm"
640-
version = "2.7.0"
640+
version = "2.8.0"
641641
existing_security_group_id = var.additional_vpe_security_group_ids["master"][count.index]
642642
use_existing_security_group_id = true
643643
target_ids = [local.master_vpe_id]
@@ -646,7 +646,7 @@ module "attach_sg_to_master_vpe" {
646646
module "attach_sg_to_api_vpe" {
647647
count = length(var.additional_vpe_security_group_ids["api"])
648648
source = "terraform-ibm-modules/security-group/ibm"
649-
version = "2.7.0"
649+
version = "2.8.0"
650650
existing_security_group_id = var.additional_vpe_security_group_ids["api"][count.index]
651651
use_existing_security_group_id = true
652652
target_ids = [local.api_vpe_id]
@@ -655,7 +655,7 @@ module "attach_sg_to_api_vpe" {
655655
module "attach_sg_to_registry_vpe" {
656656
count = length(var.additional_vpe_security_group_ids["registry"])
657657
source = "terraform-ibm-modules/security-group/ibm"
658-
version = "2.7.0"
658+
version = "2.8.0"
659659
existing_security_group_id = var.additional_vpe_security_group_ids["registry"][count.index]
660660
use_existing_security_group_id = true
661661
target_ids = [local.registry_vpe_id]

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ module "kms" {
9595
}
9696
count = (var.kms_encryption_enabled_boot_volume && var.existing_boot_volume_kms_key_crn == null) || (var.kms_encryption_enabled_cluster && var.existing_cluster_kms_key_crn == null) ? 1 : 0
9797
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
98-
version = "5.2.0"
98+
version = "5.3.0"
9999
create_key_protect_instance = false
100100
region = local.cluster_kms_region
101101
existing_kms_instance_crn = var.existing_kms_instance_crn

0 commit comments

Comments
 (0)