Skip to content

Commit 19b1eb1

Browse files
chore(deps): update terraform-module
1 parent 066652d commit 19b1eb1

File tree

7 files changed

+16
-16
lines changed

7 files changed

+16
-16
lines changed

examples/all-combined/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.1.6"
7+
version = "1.2.0"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -186,7 +186,7 @@ module "network_acl" {
186186
# OCP CLUSTER creation
187187
module "ocp_base" {
188188
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
189-
version = "3.41.7"
189+
version = "3.43.2"
190190
cluster_name = "${var.prefix}-vpc"
191191
resource_group_id = module.resource_group.resource_group_id
192192
region = var.region

examples/all-combined/privatecertificate.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ locals {
1313
# private certificate engine
1414
module "secrets_manager_private_secret_engine" {
1515
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
16-
version = "1.3.5"
16+
version = "1.3.6"
1717
secrets_manager_guid = local.sm_guid
1818
region = local.sm_region
1919
root_ca_name = var.pvt_ca_name != null ? var.pvt_ca_name : "pvt-${var.prefix}-project-root-ca"
@@ -30,7 +30,7 @@ module "secrets_manager_private_secret_engine" {
3030
module "secrets_manager_private_certificate" {
3131
depends_on = [module.secrets_manager_private_secret_engine]
3232
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
33-
version = "1.3.2"
33+
version = "1.3.3"
3434
cert_name = "${var.prefix}-sm-private-cert"
3535
cert_description = "Private certificate for ${local.pvt_cert_common_name}"
3636
cert_secrets_group_id = module.secrets_manager_group.secret_group_id

examples/all-combined/secretsmanager.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ module "iam_secrets_engine" {
7676
# create secrets group for secrets
7777
module "secrets_manager_group" {
7878
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
79-
version = "1.2.3"
79+
version = "1.3.2"
8080
region = local.sm_region
8181
secrets_manager_guid = local.sm_guid
8282
secret_group_name = "${var.prefix}-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -89,7 +89,7 @@ module "secrets_manager_group" {
8989
# additional secrets manager secret group for service level secrets
9090
module "secrets_manager_group_acct" {
9191
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
92-
version = "1.2.3"
92+
version = "1.3.2"
9393
count = var.existing_sm_instance_guid == null ? 0 : 1
9494
region = local.sm_region
9595
secrets_manager_guid = local.sm_guid

examples/all-combined/tpauth_cluster_sstore.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# creating a secrets group for clustersecretstore with trustedprofile auth
88
module "tp_clusterstore_secrets_manager_group" {
99
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
10-
version = "1.2.3"
10+
version = "1.3.2"
1111
region = local.sm_region
1212
secrets_manager_guid = local.sm_guid
1313
secret_group_name = "${var.prefix}-cpstore-tp-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/all-combined/tpauth_namespaced_sstore.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ module "eso_tp_namespace_secretstores" {
4040
# creating a secrets group for each namespace to be used for namespaced secretstores with trustedprofile auth
4141
module "tp_secrets_manager_groups" {
4242
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
43-
version = "1.2.3"
43+
version = "1.3.2"
4444
count = length(var.es_namespaces_tp)
4545
region = local.sm_region
4646
secrets_manager_guid = local.sm_guid
@@ -140,7 +140,7 @@ module "eso_tp_namespace_secretstore_multisg" {
140140
# creating two secrets groups for a single namespace to test trusted profile policy on multiple secrets groups
141141
module "tp_secrets_manager_group_multi_1" {
142142
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
143-
version = "1.2.3"
143+
version = "1.3.2"
144144
region = local.sm_region
145145
secrets_manager_guid = local.sm_guid
146146
secret_group_name = "${var.prefix}-tp-secret-group-multisg-1" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -152,7 +152,7 @@ module "tp_secrets_manager_group_multi_1" {
152152

153153
module "tp_secrets_manager_group_multi_2" {
154154
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
155-
version = "1.2.3"
155+
version = "1.3.2"
156156
region = local.sm_region
157157
secrets_manager_guid = local.sm_guid
158158
secret_group_name = "${var.prefix}-tp-secret-group-multisg-21" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -285,7 +285,7 @@ module "eso_tp_namespace_secretstore_nosecgroup" {
285285
# creating secrets group for a single namespace to test trusted profile policy without any secret group in the TP policy
286286
module "tp_secrets_manager_group_not_for_policy" {
287287
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
288-
version = "1.2.3"
288+
version = "1.3.2"
289289
region = local.sm_region
290290
secrets_manager_guid = local.sm_guid
291291
secret_group_name = "${var.prefix}-tp-secret-group-not-for-policy" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/basic/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ locals {
2929

3030
module "resource_group" {
3131
source = "terraform-ibm-modules/resource-group/ibm"
32-
version = "1.1.6"
32+
version = "1.2.0"
3333
# if an existing resource group is not set (null) create a new one using prefix
3434
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
3535
existing_resource_group_name = var.resource_group
@@ -209,7 +209,7 @@ module "network_acl" {
209209
# OCP CLUSTER creation
210210
module "ocp_base" {
211211
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
212-
version = "3.41.7"
212+
version = "3.43.2"
213213
cluster_name = "${var.prefix}-vpc"
214214
resource_group_id = module.resource_group.resource_group_id
215215
region = var.region
@@ -278,7 +278,7 @@ resource "ibm_resource_instance" "secrets_manager" {
278278
# Additional Secrets-Manager Secret-Group for SERVICE level secrets
279279
module "secrets_manager_group_acct" {
280280
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
281-
version = "1.2.3"
281+
version = "1.3.2"
282282
count = var.existing_sm_instance_guid == null ? 0 : 1
283283
region = local.sm_region
284284
secrets_manager_guid = local.sm_guid

examples/trusted-profiles-authentication/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "resource_group" {
22
source = "terraform-ibm-modules/resource-group/ibm"
3-
version = "1.1.6"
3+
version = "1.2.0"
44
# if an existing resource group is not set (null) create a new one using prefix
55
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
66
existing_resource_group_name = var.resource_group
@@ -60,7 +60,7 @@ resource "ibm_resource_instance" "secrets_manager" {
6060

6161
module "secrets_manager_groups" {
6262
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
63-
version = "1.2.3"
63+
version = "1.3.2"
6464
count = length(kubernetes_namespace.examples)
6565
region = local.sm_region
6666
secrets_manager_guid = local.sm_guid

0 commit comments

Comments
 (0)