Skip to content

Commit a771497

Browse files
authored
fix(deps): update dependencies (#597)
1 parent 0c657d6 commit a771497

File tree

15 files changed

+151
-111
lines changed

15 files changed

+151
-111
lines changed

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.23.2
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.24.0
1212
secrets: inherit

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ This module is used to create an IBM Cloud Event Notifications instance to filte
1515
* [Submodules](./modules)
1616
* [fscloud](./modules/fscloud)
1717
* [Examples](./examples)
18-
* <div style="display: inline-block;"><a href="./examples/advanced">Advanced example with BYOK encryption and CBR rules</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=en-advanced-example&repository=github.com/terraform-ibm-modules/terraform-ibm-event-notifications/tree/main/examples/advanced" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
19-
* <div style="display: inline-block;"><a href="./examples/basic">Basic example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=en-basic-example&repository=github.com/terraform-ibm-modules/terraform-ibm-event-notifications/tree/main/examples/basic" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
20-
* <div style="display: inline-block;"><a href="./examples/fscloud">Financial Services Cloud profile example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=en-fscloud-example&repository=github.com/terraform-ibm-modules/terraform-ibm-event-notifications/tree/main/examples/fscloud" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
18+
* <div style="display: inline-block;"><a href="./examples/advanced">Advanced example with BYOK encryption and CBR rules</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=en-advanced-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-event-notifications/tree/main/examples/advanced" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
19+
* <div style="display: inline-block;"><a href="./examples/basic">Basic example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=en-basic-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-event-notifications/tree/main/examples/basic" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
20+
* <div style="display: inline-block;"><a href="./examples/fscloud">Financial Services Cloud profile example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=en-fscloud-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-event-notifications/tree/main/examples/fscloud" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
2121
* [Contributing](#contributing)
2222
<!-- END OVERVIEW HOOK -->
2323

@@ -76,7 +76,7 @@ To create service credentials, access the Event Notifications service, and acces
7676

7777
| Name | Source | Version |
7878
|------|--------|---------|
79-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.8 |
79+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.34.0 |
8080

8181
### Resources
8282

examples/advanced/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.0"
7+
version = "1.4.3"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -21,7 +21,7 @@ locals {
2121

2222
module "key_protect_all_inclusive" {
2323
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
24-
version = "5.4.10"
24+
version = "5.5.3"
2525
resource_group_id = module.resource_group.resource_group_id
2626
region = var.region
2727
key_protect_instance_name = "${var.prefix}-kp"
@@ -45,7 +45,7 @@ locals {
4545

4646
module "cos" {
4747
source = "terraform-ibm-modules/cos/ibm"
48-
version = "10.5.8"
48+
version = "10.7.0"
4949
resource_group_id = module.resource_group.resource_group_id
5050
region = var.region
5151
cos_instance_name = "${var.prefix}-cos"

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.0"
7+
version = "1.4.3"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group

examples/fscloud/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.0"
7+
version = "1.4.3"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -23,7 +23,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
2323

2424
module "cbr_zone_schematics" {
2525
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
26-
version = "1.33.8"
26+
version = "1.34.0"
2727
name = "${var.prefix}-schematics-zone"
2828
zone_description = "CBR Network zone containing Schematics"
2929
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -48,7 +48,7 @@ locals {
4848

4949
module "cos" {
5050
source = "terraform-ibm-modules/cos/ibm//modules/fscloud"
51-
version = "10.5.8"
51+
version = "10.7.0"
5252
resource_group_id = module.resource_group.resource_group_id
5353
create_cos_instance = true
5454
cos_instance_name = "${var.prefix}-cos"

ibm_catalog.json

Lines changed: 48 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,7 @@
6161
"index": 2,
6262
"install_type": "fullstack",
6363
"working_directory": "solutions/security-enforced",
64+
"short_description": "This architecture deploys and configures an IBM Cloud Event Notifications instance with a required Object Storage service and bucket for undelivered events. Both the Event Notifications instance and storage bucket use key management–based encryption by default. Optional integration with IBM Cloud Secrets Manager enables secure storage of service credentials.",
6465
"configuration": [
6566
{
6667
"key": "ibmcloud_api_key"
@@ -240,11 +241,26 @@
240241
"custom_config": {
241242
"type": "code_editor",
242243
"grouping": "deployment",
243-
"original_grouping": "deployment"
244+
"original_grouping": "deployment",
245+
"config_constraints": {
246+
"supportedLanguages": [
247+
"hcl"
248+
]
249+
}
244250
}
245251
},
246252
{
247-
"key": "service_credential_names"
253+
"key": "service_credential_names",
254+
"custom_config": {
255+
"type": "code_editor",
256+
"grouping": "deployment",
257+
"original_grouping": "deployment",
258+
"config_constraints": {
259+
"supportedLanguages": [
260+
"hcl"
261+
]
262+
}
263+
}
248264
},
249265
{
250266
"key": "existing_event_notifications_instance_crn",
@@ -262,7 +278,12 @@
262278
"custom_config": {
263279
"type": "code_editor",
264280
"grouping": "deployment",
265-
"original_grouping": "deployment"
281+
"original_grouping": "deployment",
282+
"config_constraints": {
283+
"supportedLanguages": [
284+
"hcl"
285+
]
286+
}
266287
}
267288
}
268289
],
@@ -343,6 +364,7 @@
343364
"index": 1,
344365
"install_type": "fullstack",
345366
"working_directory": "solutions/fully-configurable",
367+
"short_description": "This architecture deploys and configures an IBM Cloud Event Notifications instance with a required Object Storage bucket for undelivered events. It supports optional encryption through a key management service, integration with Cloud Monitoring for operational insights, and Secrets Manager for secure credential storage.",
346368
"configuration": [
347369
{
348370
"key": "ibmcloud_api_key"
@@ -644,19 +666,39 @@
644666
"custom_config": {
645667
"type": "code_editor",
646668
"grouping": "deployment",
647-
"original_grouping": "deployment"
669+
"original_grouping": "deployment",
670+
"config_constraints": {
671+
"supportedLanguages": [
672+
"hcl"
673+
]
674+
}
648675
}
649676
},
650677
{
651-
"key": "service_credential_names"
678+
"key": "service_credential_names",
679+
"custom_config": {
680+
"type": "code_editor",
681+
"grouping": "deployment",
682+
"original_grouping": "deployment",
683+
"config_constraints": {
684+
"supportedLanguages": [
685+
"hcl"
686+
]
687+
}
688+
}
652689
},
653690
{
654691
"key": "cbr_rules",
655692
"type": "array",
656693
"custom_config": {
657694
"type": "code_editor",
658695
"grouping": "deployment",
659-
"original_grouping": "deployment"
696+
"original_grouping": "deployment",
697+
"config_constraints": {
698+
"supportedLanguages": [
699+
"hcl"
700+
]
701+
}
660702
}
661703
}
662704
],

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ resource "time_sleep" "wait_for_kms_authorization_policy" {
195195
module "cbr_rule" {
196196
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
197197
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
198-
version = "1.33.8"
198+
version = "1.34.0"
199199
rule_description = var.cbr_rules[count.index].description
200200
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
201201
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/fully-configurable/main.tf

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.0"
7+
version = "1.4.3"
88
existing_resource_group_name = var.existing_resource_group_name
99
}
1010

@@ -16,15 +16,15 @@ module "resource_group" {
1616
module "existing_kms_crn_parser" {
1717
count = var.existing_kms_instance_crn != null ? 1 : 0
1818
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19-
version = "1.3.0"
19+
version = "1.3.3"
2020
crn = var.existing_kms_instance_crn
2121
}
2222

2323
# If existing KMS root key CRN passed, parse details from it
2424
module "existing_kms_key_crn_parser" {
2525
count = var.existing_kms_root_key_crn != null ? 1 : 0
2626
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
27-
version = "1.3.0"
27+
version = "1.3.3"
2828
crn = var.existing_kms_root_key_crn
2929
}
3030

@@ -63,7 +63,7 @@ module "kms" {
6363
}
6464
count = local.create_kms_keys ? 1 : 0
6565
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
66-
version = "5.4.10"
66+
version = "5.5.3"
6767
create_key_protect_instance = false
6868
region = local.kms_region
6969
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -96,7 +96,7 @@ module "kms" {
9696
module "cos_kms_key_crn_parser" {
9797
count = (local.create_kms_keys || var.existing_kms_root_key_crn != null) ? 1 : 0
9898
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
99-
version = "1.3.0"
99+
version = "1.3.3"
100100
crn = local.cos_kms_key_crn
101101
}
102102

@@ -190,7 +190,7 @@ resource "ibm_iam_authorization_policy" "en_kms_policy" {
190190
module "existing_cos_crn_parser" {
191191
count = var.existing_cos_instance_crn != null ? 1 : 0
192192
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
193-
version = "1.3.0"
193+
version = "1.3.3"
194194
crn = var.existing_cos_instance_crn
195195
}
196196

@@ -236,7 +236,7 @@ locals {
236236
module "cos_buckets" {
237237
count = var.enable_collecting_failed_events && var.existing_event_notifications_instance_crn == null ? 1 : 0
238238
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
239-
version = "10.5.8"
239+
version = "10.7.0"
240240
bucket_configs = local.bucket_config
241241
}
242242

@@ -248,7 +248,7 @@ module "cos_buckets" {
248248
module "existing_en_crn_parser" {
249249
count = var.existing_event_notifications_instance_crn != null ? 1 : 0
250250
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
251-
version = "1.3.0"
251+
version = "1.3.3"
252252
crn = var.existing_event_notifications_instance_crn
253253
}
254254

@@ -307,7 +307,7 @@ module "event_notifications" {
307307
module "existing_sm_crn_parser" {
308308
count = var.existing_secrets_manager_instance_crn != null ? 1 : 0
309309
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
310-
version = "1.3.0"
310+
version = "1.3.3"
311311
crn = var.existing_secrets_manager_instance_crn
312312
}
313313

@@ -361,7 +361,7 @@ module "secrets_manager_service_credentials" {
361361
count = length(local.service_credential_secrets) > 0 ? 1 : 0
362362
depends_on = [time_sleep.wait_for_en_authorization_policy]
363363
source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
364-
version = "2.11.9"
364+
version = "2.12.3"
365365
existing_sm_instance_guid = local.existing_secrets_manager_instance_guid
366366
existing_sm_instance_region = local.existing_secrets_manager_instance_region
367367
endpoint_type = var.existing_secrets_manager_endpoint_type

solutions/fully-configurable/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = "1.85.0"
7+
version = "1.86.0"
88
}
99
time = {
1010
source = "hashicorp/time"

0 commit comments

Comments
 (0)