File tree Expand file tree Collapse file tree 7 files changed +9
-9
lines changed
trusted-profiles-authentication
solutions/fully-configurable Expand file tree Collapse file tree 7 files changed +9
-9
lines changed Original file line number Diff line number Diff line change @@ -186,7 +186,7 @@ module "network_acl" {
186186# OCP CLUSTER creation
187187module "ocp_base" {
188188 source = " terraform-ibm-modules/base-ocp-vpc/ibm"
189- version = " 3.52.3 "
189+ version = " 3.53.0 "
190190 cluster_name = " ${ var . prefix } -vpc"
191191 resource_group_id = module. resource_group . resource_group_id
192192 region = var. region
@@ -231,7 +231,7 @@ data "ibm_cis" "cis_instance" {
231231
232232module "vpes" {
233233 source = " terraform-ibm-modules/vpe-gateway/ibm"
234- version = " 4.6.7 "
234+ version = " 4.7.0 "
235235 count = var. service_endpoints == " private" ? 1 : 0
236236 region = var. region
237237 prefix = " vpe"
Original file line number Diff line number Diff line change @@ -13,7 +13,7 @@ locals {
1313# private certificate engine
1414module "secrets_manager_private_secret_engine" {
1515 source = " terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
16- version = " 1.6.3 "
16+ version = " 1.6.4 "
1717 secrets_manager_guid = local. sm_guid
1818 region = local. sm_region
1919 root_ca_name = var. pvt_ca_name != null ? var. pvt_ca_name : " pvt-${ var . prefix } -project-root-ca"
@@ -30,7 +30,7 @@ module "secrets_manager_private_secret_engine" {
3030module "secrets_manager_private_certificate" {
3131 depends_on = [module . secrets_manager_private_secret_engine ]
3232 source = " terraform-ibm-modules/secrets-manager-private-cert/ibm"
33- version = " 1.4.0 "
33+ version = " 1.4.1 "
3434 cert_name = " ${ var . prefix } -sm-private-cert"
3535 cert_description = " Private certificate for ${ local . pvt_cert_common_name } "
3636 cert_secrets_group_id = module. secrets_manager_group . secret_group_id
Original file line number Diff line number Diff line change 88module "secrets_manager_public_cert_engine" {
99 count = (var. acme_letsencrypt_private_key != null || (var. acme_letsencrypt_private_key_sm_id != null && var. acme_letsencrypt_private_key_secret_id != null && var. acme_letsencrypt_private_key_sm_region != null )) ? 1 : 0
1010 source = " terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
11- version = " 1.1.6 "
11+ version = " 1.1.7 "
1212 secrets_manager_guid = local. sm_guid
1313 region = local. sm_region
1414 internet_services_crn = data. ibm_cis . cis_instance . id
Original file line number Diff line number Diff line change @@ -198,7 +198,7 @@ module "network_acl" {
198198# OCP CLUSTER creation
199199module "ocp_base" {
200200 source = " terraform-ibm-modules/base-ocp-vpc/ibm"
201- version = " 3.52.3 "
201+ version = " 3.53.0 "
202202 cluster_name = " ${ var . prefix } -vpc"
203203 resource_group_id = module. resource_group . resource_group_id
204204 region = var. region
Original file line number Diff line number Diff line change @@ -166,7 +166,7 @@ module "external_secrets" {
166166
167167module "vpes" {
168168 source = " terraform-ibm-modules/vpe-gateway/ibm"
169- version = " 4.6.7 "
169+ version = " 4.7.0 "
170170 count = var. service_endpoints == " private" ? 1 : 0
171171 region = var. region
172172 prefix = " vpe"
Original file line number Diff line number Diff line change @@ -3,7 +3,7 @@ terraform {
33 required_providers {
44 kubernetes = {
55 source = " hashicorp/kubernetes"
6- version = " 2.37.1 "
6+ version = " 2.38.0 "
77 }
88 helm = {
99 source = " hashicorp/helm"
Original file line number Diff line number Diff line change @@ -184,7 +184,7 @@ module "network_acl" {
184184# OCP CLUSTER creation
185185module "ocp_base" {
186186 source = " terraform-ibm-modules/base-ocp-vpc/ibm"
187- version = " 3.52.3 "
187+ version = " 3.53.0 "
188188 cluster_name = " ${ var . prefix } -vpc"
189189 resource_group_id = module. resource_group . resource_group_id
190190 region = var. region
You can’t perform that action at this time.
0 commit comments