Skip to content

Conversation

@toddgiguere
Copy link
Member

@toddgiguere toddgiguere commented Nov 8, 2024

This PR contains the following updates:

Package Type Update Change
terraform-ibm-modules/cbr/ibm (source) module minor 1.24.0 -> 1.28.1
terraform-ibm-modules/cbr/ibm (source) module minor 1.27.0 -> 1.28.1
terraform-ibm-modules/cbr/ibm (source) module patch 1.28.0 -> 1.28.1
terraform-ibm-modules/cos/ibm (source) module minor 8.13.2 -> 8.14.2
terraform-ibm-modules/kms-all-inclusive/ibm (source) module patch 4.16.4 -> 4.16.7
terraform-ibm-modules/observability-agents/ibm (source) module minor 2.0.0 -> 2.1.0
terraform-ibm-modules/observability-instances/ibm (source) module minor 3.1.0 -> 3.3.1

Release Notes

terraform-ibm-modules/terraform-ibm-cbr (terraform-ibm-modules/cbr/ibm)

v1.28.1

Compare Source

Bug Fixes

v1.28.0

Compare Source

Features
  • added two new inputs to the fscloud profile: allow_vpcs_to_iam_groups and allow_vpcs_to_iam_access_management. By setting these to true, the following FSCloud SCC rules will pass:
    - Check whether IAM access management can be accessed only thorugh a private endpoint (Context-based restrictions or service) and allowed IPs<br>- Check whether IAM access groups can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs` (#​548) (10c5bc9)

v1.27.0

Compare Source

Features

v1.26.0

Compare Source

Features
  • added support to the cbr-zone-module to use existing zone using new inputs existing_zone_id and use_existing_cbr_zone (#​530) (3e25409)

v1.25.0

Compare Source

Features
  • updated the target_service_details input in the fscloud submodule to support setting the geography option.
    NOTE: Both region and geography cannot be set simultaneously for the container registry service. (#​519) (4060786)

v1.24.1

Compare Source

Bug Fixes
terraform-ibm-modules/terraform-ibm-cos (terraform-ibm-modules/cos/ibm)

v8.14.2

Compare Source

Bug Fixes

v8.14.1

Compare Source

Bug Fixes
  • updated the KMS auth policy so its scoped to the exact KMS Key (buckets submodule and bucket DAs) (#​765) (a685222)

v8.14.0

Compare Source

Features
  • updated the KMS auth policy created by the module so its scoped to the exact KMS Key. NOTE: This will delete and re-create any existing auth policy, however it will create before delete so there will be no disruption to services. (#​764) (211576e)

v8.13.6

Compare Source

Bug Fixes
  • deps: update terraform terraform-ibm-modules/cbr/ibm to v1.28.1 (#​761) (3f3235a)

v8.13.5

Compare Source

Bug Fixes
  • deps: update terraform ibm to latest for the deployable architecture solution (#​749) (e306061)

v8.13.4

Compare Source

Bug Fixes
  • deps: removed force_delete_key_ring from KMS module call as it is deprecated (#​757) (c83092e)

v8.13.3

Compare Source

Bug Fixes
  • remove lookup of IAM account settings to fetch account ID as this requires admin privileges (#​751) (fb0cc4d)
terraform-ibm-modules/terraform-ibm-kms-all-inclusive (terraform-ibm-modules/kms-all-inclusive/ibm)

v4.16.7

Compare Source

Bug Fixes
  • deps: update terraform terraform-ibm-modules/key-protect/ibm to v2.8.7 (#​570) (5b3235b)

v4.16.6

Compare Source

Bug Fixes
  • deps: update terraform terraform-ibm-modules/cbr/ibm to v1.28.1 (#​574) (e9572fc)

v4.16.5

Compare Source

Bug Fixes
  • update to SCC profile to CIS IBM Cloud Foundations Benchmark v1.1.0 (#​551) (80768c0)
terraform-ibm-modules/terraform-ibm-observability-agents (terraform-ibm-modules/observability-agents/ibm)

v2.1.0

Compare Source

Features
  • added container filtering for cloud monitoring agents using new variable cloud_monitoring_container_filter (#​419) (fb04b92)

v2.0.1

Compare Source

Bug Fixes
terraform-ibm-modules/terraform-ibm-observability-instances (terraform-ibm-modules/observability-instances/ibm)

v3.3.1

Compare Source

Bug Fixes
  • wait 30 seconds after auth policy is created before creating metrics router target to ensure auth policy is fully in place before proceeding (#​604) (4364b44)

v3.3.0

Compare Source

Features

v3.2.0

Compare Source

Features
  • added support to specify Cloud Logs policies using new input cloud_logs_policies (#​600) (17dbaaf)

v3.1.1

Compare Source

Bug Fixes
  • remove ibm_iam_account_settings from cloud logs module so that account admin access is not required (#​589) (b11fe92)

@toddgiguere toddgiguere requested a review from Aashiq-J as a code owner November 8, 2024 21:15
@toddgiguere
Copy link
Member Author

/run pipeline

@toddgiguere
Copy link
Member Author

/run pipeline

ocofaigh
ocofaigh previously approved these changes Nov 11, 2024
@toddgiguere
Copy link
Member Author

/run pipeline

@toddgiguere
Copy link
Member Author

In order to fix a timing issue with deletion of cluster encryption keys, the Advanced example has been changed to use the force_delete = true option on the keys to avoid any errors during the destroy process.

This change has caused a fail condition in the upgrade test:

Messages:   	Resource(s) identified to be updated 
        	            	Name: key
        	            	Address: module.kp_all_inclusive.module.kms_keys["ocp.base-ocp-upg-fytrqc-boot-volume-encryption-key"].ibm_kms_key.key
        	            	Actions: [update]
        	            	DIFF:
        	            	  Before: 
        	            		{"force_delete":false}
        	            	  After: 
        	            		{"force_delete":true}

Since this was the only change identified by the upgrade test, and it was done on purpose and only within the example code, I will mark this PR as SKIP UPGRADE TEST.

@toddgiguere
Copy link
Member Author

/run pipeline

@ocofaigh ocofaigh merged commit 7f9783b into main Nov 12, 2024
2 checks passed
@ocofaigh ocofaigh deleted the renovate-fixes branch November 12, 2024 10:40
@terraform-ibm-modules-ops
Copy link
Contributor

🎉 This PR is included in version 3.35.1 🎉

The release is available on GitHub release

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants