Skip to content

Commit 3452e55

Browse files
fix(deps): update dependencies
1 parent ee0c78a commit 3452e55

File tree

15 files changed

+65
-54
lines changed

15 files changed

+65
-54
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -525,13 +525,13 @@ You need the following permissions to run this module.
525525
| <a name="input_eso_pod_configuration"></a> [eso\_pod\_configuration](#input\_eso\_pod\_configuration) | Configuration to use to customise ESO deployment on specific pods. Setting appropriate values will result in customising ESO helm release. Default value is {} to keep ESO standard deployment. Ignore the key if not required. | <pre>object({<br/> annotations = optional(object({<br/> # The annotations for external secret controller pods.<br/> external_secrets = optional(map(string), {})<br/> # The annotations for external secret cert controller pods.<br/> external_secrets_cert_controller = optional(map(string), {})<br/> # The annotations for external secret controller pods.<br/> external_secrets_webhook = optional(map(string), {})<br/> }), {})<br/><br/> labels = optional(object({<br/> # The labels for external secret controller pods.<br/> external_secrets = optional(map(string), {})<br/> # The labels for external secret cert controller pods.<br/> external_secrets_cert_controller = optional(map(string), {})<br/> # The labels for external secret controller pods.<br/> external_secrets_webhook = optional(map(string), {})<br/> }), {})<br/> })</pre> | `{}` | no |
526526
| <a name="input_existing_eso_namespace"></a> [existing\_eso\_namespace](#input\_existing\_eso\_namespace) | Existing Namespace to be used to install ESO components including helm releases. | `string` | `null` | no |
527527
| <a name="input_reloader_chart_location"></a> [reloader\_chart\_location](#input\_reloader\_chart\_location) | The location of the Reloader Helm chart. | `string` | `"https://stakater.github.io/stakater-charts"` | no |
528-
| <a name="input_reloader_chart_version"></a> [reloader\_chart\_version](#input\_reloader\_chart\_version) | The version of the Reloader Helm chart. Ensure that the chart version is compatible with the image version specified in reloader\_image\_version. | `string` | `"2.2.0"` | no |
528+
| <a name="input_reloader_chart_version"></a> [reloader\_chart\_version](#input\_reloader\_chart\_version) | The version of the Reloader Helm chart. Ensure that the chart version is compatible with the image version specified in reloader\_image\_version. | `string` | `"2.2.2"` | no |
529529
| <a name="input_reloader_custom_values"></a> [reloader\_custom\_values](#input\_reloader\_custom\_values) | String containing custom values to be used for reloader helm chart. See https://github.com/stakater/Reloader/blob/master/deployments/kubernetes/chart/reloader/values.yaml | `string` | `null` | no |
530530
| <a name="input_reloader_deployed"></a> [reloader\_deployed](#input\_reloader\_deployed) | Whether to deploy reloader or not https://github.com/stakater/Reloader | `bool` | `true` | no |
531531
| <a name="input_reloader_ignore_configmaps"></a> [reloader\_ignore\_configmaps](#input\_reloader\_ignore\_configmaps) | Whether to ignore configmap changes or not | `bool` | `false` | no |
532532
| <a name="input_reloader_ignore_secrets"></a> [reloader\_ignore\_secrets](#input\_reloader\_ignore\_secrets) | Whether to ignore secret changes or not | `bool` | `false` | no |
533533
| <a name="input_reloader_image"></a> [reloader\_image](#input\_reloader\_image) | The reloader image repository in the format of `[registry-url]/[namespace]/[image]`. | `string` | `"ghcr.io/stakater/reloader"` | no |
534-
| <a name="input_reloader_image_version"></a> [reloader\_image\_version](#input\_reloader\_image\_version) | The version or digest for the reloader image to deploy. If changing the value, ensure it is compatible with the chart version set in reloader\_chart\_version. | `string` | `"v1.4.6-ubi@sha256:98403ed026af2eac04796f8e3d99530ed7f251a5d40b50ac172a008933338d48"` | no |
534+
| <a name="input_reloader_image_version"></a> [reloader\_image\_version](#input\_reloader\_image\_version) | The version or digest for the reloader image to deploy. If changing the value, ensure it is compatible with the chart version set in reloader\_chart\_version. | `string` | `"v1.4.7-ubi@sha256:664864220e594e5a66e9ef1e772a52d71bdb594ba36f849606177eeed573f031"` | no |
535535
| <a name="input_reloader_is_argo_rollouts"></a> [reloader\_is\_argo\_rollouts](#input\_reloader\_is\_argo\_rollouts) | Enable Argo Rollouts | `bool` | `false` | no |
536536
| <a name="input_reloader_is_openshift"></a> [reloader\_is\_openshift](#input\_reloader\_is\_openshift) | Enable OpenShift DeploymentConfigs | `bool` | `true` | no |
537537
| <a name="input_reloader_log_format"></a> [reloader\_log\_format](#input\_reloader\_log\_format) | The log format to use for reloader. Possible values are `json` or `text`. Default value is `json` | `string` | `"text"` | no |

examples/all-combined/clusterstore.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ locals {
3939
# Create username_password secret and store in secret manager
4040
module "sm_userpass_secret" {
4141
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
42-
version = "1.7.0"
42+
version = "1.8.0"
4343
region = local.sm_region
4444
secrets_manager_guid = local.sm_guid
4545
secret_group_id = module.secrets_manager_group.secret_group_id

examples/all-combined/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ module "network_acl" {
186186
# OCP CLUSTER creation
187187
module "ocp_base" {
188188
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
189-
version = "3.55.4"
189+
version = "3.55.5"
190190
cluster_name = "${var.prefix}-vpc"
191191
resource_group_id = module.resource_group.resource_group_id
192192
region = var.region

examples/all-combined/publiccertificate.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
module "secrets_manager_public_cert_engine" {
99
count = (var.acme_letsencrypt_private_key != null || (var.acme_letsencrypt_private_key_sm_id != null && var.acme_letsencrypt_private_key_secret_id != null && var.acme_letsencrypt_private_key_sm_region != null)) ? 1 : 0
1010
source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
11-
version = "1.1.9"
11+
version = "1.1.10"
1212
secrets_manager_guid = local.sm_guid
1313
region = local.sm_region
1414
internet_services_crn = data.ibm_cis.cis_instance.id

examples/all-combined/secretstore.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ locals {
5050
# create the arbitrary secret and store in secret manager
5151
module "sm_arbitrary_imagepull_secret" {
5252
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
53-
version = "1.7.0"
53+
version = "1.8.0"
5454
region = local.sm_region
5555
secrets_manager_guid = local.sm_guid
5656
secret_group_id = module.secrets_manager_group.secret_group_id

examples/all-combined/tpauth_cluster_sstore.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ module "eso_clusterstore_tpauth" {
5353
# arbitrary secret to be synched through the clustersecretstore with TP authentication
5454
module "sm_cstore_arbitrary_secret_tp" {
5555
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
56-
version = "1.7.0"
56+
version = "1.8.0"
5757
region = local.sm_region
5858
secrets_manager_guid = local.sm_guid
5959
secret_group_id = module.tp_clusterstore_secrets_manager_group.secret_group_id

examples/all-combined/tpauth_namespaced_sstore.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ module "external_secrets_trusted_profiles" {
6767
module "sm_arbitrary_secrets_tp" {
6868
count = length(var.es_namespaces_tp)
6969
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
70-
version = "1.7.0"
70+
version = "1.8.0"
7171
region = local.sm_region
7272
secrets_manager_guid = local.sm_guid
7373
secret_group_id = module.tp_secrets_manager_groups[count.index].secret_group_id
@@ -165,7 +165,7 @@ module "tp_secrets_manager_group_multi_2" {
165165
# arbitrary secret for secrets group 1
166166
module "sm_arbitrary_secret_tp_multisg_1" {
167167
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
168-
version = "1.7.0"
168+
version = "1.8.0"
169169
region = local.sm_region
170170
secrets_manager_guid = local.sm_guid
171171
secret_group_id = module.tp_secrets_manager_group_multi_1.secret_group_id
@@ -182,7 +182,7 @@ module "sm_arbitrary_secret_tp_multisg_1" {
182182
# arbitrary secret for secrets group 2
183183
module "sm_arbitrary_secret_tp_multisg_2" {
184184
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
185-
version = "1.7.0"
185+
version = "1.8.0"
186186
region = local.sm_region
187187
secrets_manager_guid = local.sm_guid
188188
secret_group_id = module.tp_secrets_manager_group_multi_2.secret_group_id
@@ -298,7 +298,7 @@ module "tp_secrets_manager_group_not_for_policy" {
298298
# arbitrary secret to use with external secret with auth using TP and policy not restricted to secrets group
299299
module "sm_arbitrary_secret_tp_nosecgroup" {
300300
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
301-
version = "1.7.0"
301+
version = "1.8.0"
302302
region = local.sm_region
303303
secrets_manager_guid = local.sm_guid
304304
secret_group_id = module.tp_secrets_manager_group_not_for_policy.secret_group_id

examples/basic/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ module "network_acl" {
198198
# OCP CLUSTER creation
199199
module "ocp_base" {
200200
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
201-
version = "3.55.4"
201+
version = "3.55.5"
202202
cluster_name = "${var.prefix}-vpc"
203203
resource_group_id = module.resource_group.resource_group_id
204204
region = var.region
@@ -370,7 +370,7 @@ locals {
370370
# Create username_password secret and store in secret manager
371371
module "sm_userpass_secret" {
372372
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
373-
version = "1.7.0"
373+
version = "1.8.0"
374374
region = local.sm_region
375375
secrets_manager_guid = local.sm_guid
376376
secret_group_id = module.secrets_manager_group_acct.secret_group_id

examples/trusted-profiles-authentication/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ resource "kubernetes_namespace" "examples" {
7171
module "sm_arbitrary_secrets" {
7272
count = length(kubernetes_namespace.examples)
7373
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
74-
version = "1.7.0"
74+
version = "1.8.0"
7575
region = local.sm_region
7676
secrets_manager_guid = local.sm_guid
7777
secret_group_id = module.secrets_manager_groups[count.index].secret_group_id

0 commit comments

Comments
 (0)