Skip to content

Commit 4752713

Browse files
fix(deps): update dependencies
1 parent d4a03c2 commit 4752713

File tree

9 files changed

+20
-20
lines changed

9 files changed

+20
-20
lines changed

examples/all-combined/privatecertificate.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ locals {
1313
# private certificate engine
1414
module "secrets_manager_private_secret_engine" {
1515
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
16-
version = "1.11.0"
16+
version = "1.11.1"
1717
secrets_manager_guid = local.sm_guid
1818
region = local.sm_region
1919
root_ca_name = var.pvt_ca_name != null ? var.pvt_ca_name : "pvt-${var.prefix}-project-root-ca"

examples/all-combined/secretsmanager.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ resource "ibm_resource_instance" "secrets_manager" {
3636
# create secrets group for secrets
3737
module "secrets_manager_group" {
3838
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
39-
version = "1.3.16"
39+
version = "1.3.17"
4040
region = local.sm_region
4141
secrets_manager_guid = local.sm_guid
4242
secret_group_name = "${var.prefix}-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -49,7 +49,7 @@ module "secrets_manager_group" {
4949
# additional secrets manager secret group for service level secrets
5050
module "secrets_manager_group_acct" {
5151
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
52-
version = "1.3.16"
52+
version = "1.3.17"
5353
region = local.sm_region
5454
secrets_manager_guid = local.sm_guid
5555
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/all-combined/tpauth_cluster_sstore.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# creating a secrets group for clustersecretstore with trustedprofile auth
88
module "tp_clusterstore_secrets_manager_group" {
99
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
10-
version = "1.3.16"
10+
version = "1.3.17"
1111
region = local.sm_region
1212
secrets_manager_guid = local.sm_guid
1313
secret_group_name = "${var.prefix}-cpstore-tp-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/all-combined/tpauth_namespaced_sstore.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ module "eso_tp_namespace_secretstores" {
4040
# creating a secrets group for each namespace to be used for namespaced secretstores with trustedprofile auth
4141
module "tp_secrets_manager_groups" {
4242
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
43-
version = "1.3.16"
43+
version = "1.3.17"
4444
count = length(var.es_namespaces_tp)
4545
region = local.sm_region
4646
secrets_manager_guid = local.sm_guid
@@ -140,7 +140,7 @@ module "eso_tp_namespace_secretstore_multisg" {
140140
# creating two secrets groups for a single namespace to test trusted profile policy on multiple secrets groups
141141
module "tp_secrets_manager_group_multi_1" {
142142
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
143-
version = "1.3.16"
143+
version = "1.3.17"
144144
region = local.sm_region
145145
secrets_manager_guid = local.sm_guid
146146
secret_group_name = "${var.prefix}-tp-secret-group-multisg-1" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -152,7 +152,7 @@ module "tp_secrets_manager_group_multi_1" {
152152

153153
module "tp_secrets_manager_group_multi_2" {
154154
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
155-
version = "1.3.16"
155+
version = "1.3.17"
156156
region = local.sm_region
157157
secrets_manager_guid = local.sm_guid
158158
secret_group_name = "${var.prefix}-tp-secret-group-multisg-21" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -285,7 +285,7 @@ module "eso_tp_namespace_secretstore_nosecgroup" {
285285
# creating secrets group for a single namespace to test trusted profile policy without any secret group in the TP policy
286286
module "tp_secrets_manager_group_not_for_policy" {
287287
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
288-
version = "1.3.16"
288+
version = "1.3.17"
289289
region = local.sm_region
290290
secrets_manager_guid = local.sm_guid
291291
secret_group_name = "${var.prefix}-tp-secret-group-not-for-policy" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ resource "ibm_resource_instance" "secrets_manager" {
267267
# Additional Secrets-Manager Secret-Group for SERVICE level secrets
268268
module "secrets_manager_group_acct" {
269269
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
270-
version = "1.3.16"
270+
version = "1.3.17"
271271
region = local.sm_region
272272
secrets_manager_guid = local.sm_guid
273273
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/trusted-profiles-authentication/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ resource "ibm_resource_instance" "secrets_manager" {
4141

4242
module "secrets_manager_groups" {
4343
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
44-
version = "1.3.16"
44+
version = "1.3.17"
4545
count = length(kubernetes_namespace.examples)
4646
region = local.sm_region
4747
secrets_manager_guid = local.sm_guid

solutions/fully-configurable/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ module "cluster_secrets_stores_service_secrets_groups" {
107107
for idx, element in local.cluster_secrets_stores_service_secrets_groups_list : element.key => element
108108
})
109109
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
110-
version = "1.3.16"
110+
version = "1.3.17"
111111
region = local.sm_region
112112
secrets_manager_guid = local.sm_guid
113113
secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -167,7 +167,7 @@ module "cluster_secrets_stores_account_secrets_groups" {
167167
} if(cluster_secrets_store.existing_account_secrets_group_id == null || cluster_secrets_store.existing_account_secrets_group_id == "") && cluster_secrets_store.account_secrets_group_name != null
168168
})
169169
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
170-
version = "1.3.16"
170+
version = "1.3.17"
171171
region = local.sm_region
172172
secrets_manager_guid = local.sm_guid
173173
secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -366,7 +366,7 @@ module "secrets_stores_service_secrets_groups" {
366366
for idx, element in local.secrets_stores_service_secrets_groups_list : element.key => element
367367
})
368368
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
369-
version = "1.3.16"
369+
version = "1.3.17"
370370
region = local.sm_region
371371
secrets_manager_guid = local.sm_guid
372372
secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -426,7 +426,7 @@ module "secrets_stores_account_secrets_groups" {
426426
} if(secrets_store.existing_account_secrets_group_id == null || secrets_store.existing_account_secrets_group_id == "") && secrets_store.account_secrets_group_name != null
427427
})
428428
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
429-
version = "1.3.16"
429+
version = "1.3.17"
430430
region = local.sm_region
431431
secrets_manager_guid = local.sm_guid
432432
secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

tests/go.mod

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ toolchain go1.25.4
77
require (
88
github.com/gruntwork-io/terratest v0.52.0
99
github.com/stretchr/testify v1.11.1
10-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20
10+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.21
1111
gopkg.in/yaml.v3 v3.0.1
1212
k8s.io/apimachinery v0.34.1
1313
)
@@ -162,7 +162,7 @@ require (
162162
golang.org/x/mod v0.28.0 // indirect
163163
golang.org/x/net v0.45.0 // indirect
164164
golang.org/x/oauth2 v0.27.0 // indirect
165-
golang.org/x/sync v0.17.0 // indirect
165+
golang.org/x/sync v0.18.0 // indirect
166166
golang.org/x/sys v0.37.0 // indirect
167167
golang.org/x/term v0.36.0 // indirect
168168
golang.org/x/text v0.30.0 // indirect

tests/go.sum

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -451,8 +451,8 @@ github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXl
451451
github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
452452
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
453453
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
454-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20 h1:jESkPVhbtjVGnZFEg227spKiA+p0nAA4pslMmA8OhYw=
455-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20/go.mod h1:c1PLKvLVUfjjnzbIJ2Q59/mjOV9SWtYA5p/5k0JvER0=
454+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.21 h1:u+m413fTNcv8pM8q3xZUZCnNPh6/Ax9TtGEPC9XCswU=
455+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.21/go.mod h1:uBNM9I6XCkIJXhWPwPIyKWOWTxWMJvR34XPoCpbcpos=
456456
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
457457
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
458458
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=
@@ -566,8 +566,8 @@ golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
566566
golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
567567
golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
568568
golang.org/x/sync v0.5.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
569-
golang.org/x/sync v0.17.0 h1:l60nONMj9l5drqw6jlhIELNv9I0A4OFgRsG9k2oT9Ug=
570-
golang.org/x/sync v0.17.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
569+
golang.org/x/sync v0.18.0 h1:kr88TuHDroi+UVf+0hZnirlk8o8T+4MrK6mr60WkH/I=
570+
golang.org/x/sync v0.18.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
571571
golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
572572
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
573573
golang.org/x/sys v0.0.0-20190222072716-a9d3bda3a223/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=

0 commit comments

Comments
 (0)