Skip to content

Commit 5c2fa2b

Browse files
authored
chore(deps): update terraform-module and ci dependencies (#52)
1 parent 066652d commit 5c2fa2b

File tree

12 files changed

+23
-19
lines changed

12 files changed

+23
-19
lines changed

examples/all-combined/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,3 +78,7 @@ The example is split into separated templates related with their specific scope:
7878
The test is currently using the existing SecretManager region to deploy the VPC and the cluster if this value is not null. Instead if null it follows what set through `var.region`
7979

8080
This logic is achieved through the local `sm_region` variable that is then used to create resources.
81+
82+
### Note for the example maintainers
83+
84+
The test leverages on a set of secrets existing on IBM Cloud Secrets Manager instance to pull the secrets values and to configure them through External Secrets operator: the secrets for the imported certificate (public certificate stored in `geretain-eso-test-importedcert-public-certificate`, intermediate certificate store in `geretain-eso-test-importedcert-intermediate-certificate` and private key stored in `geretain-eso-test-importedcert-private-key`) expire periodically, in the case these secrets expire the new values can be retrieved from the secret named `geretain-eso-public-certificate-for-imported-ones` which contains the three different components (it is a public certificate generated for a test CN) and it is configured to be automatically rotated by Secrets Manager.

examples/all-combined/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ module "network_acl" {
186186
# OCP CLUSTER creation
187187
module "ocp_base" {
188188
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
189-
version = "3.41.7"
189+
version = "3.43.2"
190190
cluster_name = "${var.prefix}-vpc"
191191
resource_group_id = module.resource_group.resource_group_id
192192
region = var.region

examples/all-combined/privatecertificate.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ locals {
1313
# private certificate engine
1414
module "secrets_manager_private_secret_engine" {
1515
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
16-
version = "1.3.5"
16+
version = "1.3.6"
1717
secrets_manager_guid = local.sm_guid
1818
region = local.sm_region
1919
root_ca_name = var.pvt_ca_name != null ? var.pvt_ca_name : "pvt-${var.prefix}-project-root-ca"
@@ -30,7 +30,7 @@ module "secrets_manager_private_secret_engine" {
3030
module "secrets_manager_private_certificate" {
3131
depends_on = [module.secrets_manager_private_secret_engine]
3232
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
33-
version = "1.3.2"
33+
version = "1.3.3"
3434
cert_name = "${var.prefix}-sm-private-cert"
3535
cert_description = "Private certificate for ${local.pvt_cert_common_name}"
3636
cert_secrets_group_id = module.secrets_manager_group.secret_group_id

examples/all-combined/secretsmanager.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ module "iam_secrets_engine" {
7676
# create secrets group for secrets
7777
module "secrets_manager_group" {
7878
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
79-
version = "1.2.3"
79+
version = "1.3.2"
8080
region = local.sm_region
8181
secrets_manager_guid = local.sm_guid
8282
secret_group_name = "${var.prefix}-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -89,7 +89,7 @@ module "secrets_manager_group" {
8989
# additional secrets manager secret group for service level secrets
9090
module "secrets_manager_group_acct" {
9191
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
92-
version = "1.2.3"
92+
version = "1.3.2"
9393
count = var.existing_sm_instance_guid == null ? 0 : 1
9494
region = local.sm_region
9595
secrets_manager_guid = local.sm_guid

examples/all-combined/tpauth_cluster_sstore.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# creating a secrets group for clustersecretstore with trustedprofile auth
88
module "tp_clusterstore_secrets_manager_group" {
99
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
10-
version = "1.2.3"
10+
version = "1.3.2"
1111
region = local.sm_region
1212
secrets_manager_guid = local.sm_guid
1313
secret_group_name = "${var.prefix}-cpstore-tp-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/all-combined/tpauth_namespaced_sstore.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ module "eso_tp_namespace_secretstores" {
4040
# creating a secrets group for each namespace to be used for namespaced secretstores with trustedprofile auth
4141
module "tp_secrets_manager_groups" {
4242
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
43-
version = "1.2.3"
43+
version = "1.3.2"
4444
count = length(var.es_namespaces_tp)
4545
region = local.sm_region
4646
secrets_manager_guid = local.sm_guid
@@ -140,7 +140,7 @@ module "eso_tp_namespace_secretstore_multisg" {
140140
# creating two secrets groups for a single namespace to test trusted profile policy on multiple secrets groups
141141
module "tp_secrets_manager_group_multi_1" {
142142
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
143-
version = "1.2.3"
143+
version = "1.3.2"
144144
region = local.sm_region
145145
secrets_manager_guid = local.sm_guid
146146
secret_group_name = "${var.prefix}-tp-secret-group-multisg-1" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -152,7 +152,7 @@ module "tp_secrets_manager_group_multi_1" {
152152

153153
module "tp_secrets_manager_group_multi_2" {
154154
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
155-
version = "1.2.3"
155+
version = "1.3.2"
156156
region = local.sm_region
157157
secrets_manager_guid = local.sm_guid
158158
secret_group_name = "${var.prefix}-tp-secret-group-multisg-21" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -285,7 +285,7 @@ module "eso_tp_namespace_secretstore_nosecgroup" {
285285
# creating secrets group for a single namespace to test trusted profile policy without any secret group in the TP policy
286286
module "tp_secrets_manager_group_not_for_policy" {
287287
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
288-
version = "1.2.3"
288+
version = "1.3.2"
289289
region = local.sm_region
290290
secrets_manager_guid = local.sm_guid
291291
secret_group_name = "${var.prefix}-tp-secret-group-not-for-policy" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/basic/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ module "network_acl" {
209209
# OCP CLUSTER creation
210210
module "ocp_base" {
211211
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
212-
version = "3.41.7"
212+
version = "3.43.2"
213213
cluster_name = "${var.prefix}-vpc"
214214
resource_group_id = module.resource_group.resource_group_id
215215
region = var.region
@@ -278,7 +278,7 @@ resource "ibm_resource_instance" "secrets_manager" {
278278
# Additional Secrets-Manager Secret-Group for SERVICE level secrets
279279
module "secrets_manager_group_acct" {
280280
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
281-
version = "1.2.3"
281+
version = "1.3.2"
282282
count = var.existing_sm_instance_guid == null ? 0 : 1
283283
region = local.sm_region
284284
secrets_manager_guid = local.sm_guid

examples/trusted-profiles-authentication/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ resource "ibm_resource_instance" "secrets_manager" {
6060

6161
module "secrets_manager_groups" {
6262
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
63-
version = "1.2.3"
63+
version = "1.3.2"
6464
count = length(kubernetes_namespace.examples)
6565
region = local.sm_region
6666
secrets_manager_guid = local.sm_guid

tests/go.mod

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@ module github.com/terraform-ibm-modules/terraform-ibm-external-secrets-operator
22

33
go 1.23.0
44

5-
toolchain go1.24.1
5+
toolchain go1.24.2
66

77
require (
88
github.com/gruntwork-io/terratest v0.48.2
99
github.com/stretchr/testify v1.10.0
10-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.47.1
10+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.48.0
1111
gopkg.in/yaml.v3 v3.0.1
1212
k8s.io/apimachinery v0.32.3
1313
)

0 commit comments

Comments
 (0)