Skip to content

Commit 6855c13

Browse files
authored
fix(deps): update dependencies (#180)
1 parent 4be408e commit 6855c13

File tree

21 files changed

+80
-81
lines changed

21 files changed

+80
-81
lines changed

README.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ External Secrets Operator synchronizes secrets in the Kubernetes cluster with se
3232

3333
The module provides the following features:
3434
- Install and configure External Secrets Operator (ESO).
35-
- Customise External Secret Operator deployment on specific cluster workers by configuration approriate NodeSelector and Tolerations in the ESO helm release [More details below](#customise-eso-deployment-on-specific-cluster-nodes)
35+
- Customise External Secret Operator deployment on specific cluster workers by configuration appropriate NodeSelector and Tolerations in the ESO helm release [More details below](#customise-eso-deployment-on-specific-cluster-nodes)
3636

3737
The submodules automate the configuration of an operator, providing the following features:
3838
- Deploy and configure [ClusterSecretStore](https://external-secrets.io/latest/api/clustersecretstore/) resources for cluster scope secrets store [eso-clusterstore](./eso-clusterstore/README.md)
@@ -116,7 +116,6 @@ will make the External Secret Operator to run on clusters nodes labeled with `de
116116
The resulting helm release configuration, according to the `terraform plan` output would be like
117117

118118
```bash
119-
120119
(...)
121120
# module.external_secrets_operator.helm_release.external_secrets_operator[0] will be created
122121
+ resource "helm_release" "external_secrets_operator" {
@@ -520,18 +519,18 @@ You need the following permissions to run this module.
520519
| <a name="input_eso_cluster_nodes_configuration"></a> [eso\_cluster\_nodes\_configuration](#input\_eso\_cluster\_nodes\_configuration) | Configuration to use to customise ESO deployment on specific cluster nodes. Setting appropriate values will result in customising ESO helm release. Default value is null to keep ESO standard deployment. | <pre>object({<br/> nodeSelector = object({<br/> label = string<br/> value = string<br/> })<br/> tolerations = object({<br/> key = string<br/> operator = string<br/> value = string<br/> effect = string<br/> })<br/> })</pre> | `null` | no |
521520
| <a name="input_eso_enroll_in_servicemesh"></a> [eso\_enroll\_in\_servicemesh](#input\_eso\_enroll\_in\_servicemesh) | Flag to enroll ESO into istio servicemesh | `bool` | `false` | no |
522521
| <a name="input_eso_image"></a> [eso\_image](#input\_eso\_image) | The External Secrets Operator image in the format of `[registry-url]/[namespace]/[image]`. | `string` | `"ghcr.io/external-secrets/external-secrets"` | no |
523-
| <a name="input_eso_image_version"></a> [eso\_image\_version](#input\_eso\_image\_version) | The version or digest for the external secrets image to deploy. If changing the value, ensure it is compatible with the chart version set in eso\_chart\_version. | `string` | `"v0.19.2-ubi@sha256:b85e577e14c0a943e5eda57d631012d8fe7cea0e747069bfd9fdf3736cdad3ad"` | no |
522+
| <a name="input_eso_image_version"></a> [eso\_image\_version](#input\_eso\_image\_version) | The version or digest for the external secrets image to deploy. If changing the value, ensure it is compatible with the chart version set in eso\_chart\_version. | `string` | `"v0.20.1-ubi@sha256:33dc5f563339e6332e1549c9e3c2b362d1e1b03acada1386a6f2c6f2d5af4a6e"` | no |
524523
| <a name="input_eso_namespace"></a> [eso\_namespace](#input\_eso\_namespace) | Namespace to create and be used to install ESO components including helm releases. | `string` | `null` | no |
525524
| <a name="input_eso_pod_configuration"></a> [eso\_pod\_configuration](#input\_eso\_pod\_configuration) | Configuration to use to customise ESO deployment on specific pods. Setting appropriate values will result in customising ESO helm release. Default value is {} to keep ESO standard deployment. Ignore the key if not required. | <pre>object({<br/> annotations = optional(object({<br/> # The annotations for external secret controller pods.<br/> external_secrets = optional(map(string), {})<br/> # The annotations for external secret cert controller pods.<br/> external_secrets_cert_controller = optional(map(string), {})<br/> # The annotations for external secret controller pods.<br/> external_secrets_webhook = optional(map(string), {})<br/> }), {})<br/><br/> labels = optional(object({<br/> # The labels for external secret controller pods.<br/> external_secrets = optional(map(string), {})<br/> # The labels for external secret cert controller pods.<br/> external_secrets_cert_controller = optional(map(string), {})<br/> # The labels for external secret controller pods.<br/> external_secrets_webhook = optional(map(string), {})<br/> }), {})<br/> })</pre> | `{}` | no |
526525
| <a name="input_existing_eso_namespace"></a> [existing\_eso\_namespace](#input\_existing\_eso\_namespace) | Existing Namespace to be used to install ESO components including helm releases. | `string` | `null` | no |
527526
| <a name="input_reloader_chart_location"></a> [reloader\_chart\_location](#input\_reloader\_chart\_location) | The location of the Reloader Helm chart. | `string` | `"https://stakater.github.io/stakater-charts"` | no |
528-
| <a name="input_reloader_chart_version"></a> [reloader\_chart\_version](#input\_reloader\_chart\_version) | The version of the Reloader Helm chart. Ensure that the chart version is compatible with the image version specified in reloader\_image\_version. | `string` | `"2.2.0"` | no |
527+
| <a name="input_reloader_chart_version"></a> [reloader\_chart\_version](#input\_reloader\_chart\_version) | The version of the Reloader Helm chart. Ensure that the chart version is compatible with the image version specified in reloader\_image\_version. | `string` | `"2.2.3"` | no |
529528
| <a name="input_reloader_custom_values"></a> [reloader\_custom\_values](#input\_reloader\_custom\_values) | String containing custom values to be used for reloader helm chart. See https://github.com/stakater/Reloader/blob/master/deployments/kubernetes/chart/reloader/values.yaml | `string` | `null` | no |
530529
| <a name="input_reloader_deployed"></a> [reloader\_deployed](#input\_reloader\_deployed) | Whether to deploy reloader or not https://github.com/stakater/Reloader | `bool` | `true` | no |
531530
| <a name="input_reloader_ignore_configmaps"></a> [reloader\_ignore\_configmaps](#input\_reloader\_ignore\_configmaps) | Whether to ignore configmap changes or not | `bool` | `false` | no |
532531
| <a name="input_reloader_ignore_secrets"></a> [reloader\_ignore\_secrets](#input\_reloader\_ignore\_secrets) | Whether to ignore secret changes or not | `bool` | `false` | no |
533532
| <a name="input_reloader_image"></a> [reloader\_image](#input\_reloader\_image) | The reloader image repository in the format of `[registry-url]/[namespace]/[image]`. | `string` | `"ghcr.io/stakater/reloader"` | no |
534-
| <a name="input_reloader_image_version"></a> [reloader\_image\_version](#input\_reloader\_image\_version) | The version or digest for the reloader image to deploy. If changing the value, ensure it is compatible with the chart version set in reloader\_chart\_version. | `string` | `"v1.4.6-ubi@sha256:98403ed026af2eac04796f8e3d99530ed7f251a5d40b50ac172a008933338d48"` | no |
533+
| <a name="input_reloader_image_version"></a> [reloader\_image\_version](#input\_reloader\_image\_version) | The version or digest for the reloader image to deploy. If changing the value, ensure it is compatible with the chart version set in reloader\_chart\_version. | `string` | `"v1.4.8-ubi@sha256:d87801fae5424f347d34b776ba25ea0c1ba80a8b50ba91ece0777206a47d91d3"` | no |
535534
| <a name="input_reloader_is_argo_rollouts"></a> [reloader\_is\_argo\_rollouts](#input\_reloader\_is\_argo\_rollouts) | Enable Argo Rollouts | `bool` | `false` | no |
536535
| <a name="input_reloader_is_openshift"></a> [reloader\_is\_openshift](#input\_reloader\_is\_openshift) | Enable OpenShift DeploymentConfigs | `bool` | `true` | no |
537536
| <a name="input_reloader_log_format"></a> [reloader\_log\_format](#input\_reloader\_log\_format) | The log format to use for reloader. Possible values are `json` or `text`. Default value is `json` | `string` | `"text"` | no |

examples/all-combined/clusterstore.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ locals {
3939
# Create username_password secret and store in secret manager
4040
module "sm_userpass_secret" {
4141
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
42-
version = "1.7.0"
42+
version = "1.9.0"
4343
region = local.sm_region
4444
secrets_manager_guid = local.sm_guid
4545
secret_group_id = module.secrets_manager_group.secret_group_id
@@ -51,8 +51,8 @@ module "sm_userpass_secret" {
5151
#tfsec:ignore:general-secrets-no-plaintext-exposure
5252
secret_username = "artifactory-user" # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
5353
secret_auto_rotation = false
54-
secret_auto_rotation_interval = 0
55-
secret_auto_rotation_unit = null
54+
secret_auto_rotation_interval = 1
55+
secret_auto_rotation_unit = "day"
5656
providers = {
5757
ibm = ibm.ibm-sm
5858
}

examples/all-combined/main.tf

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ module "zone_subnet_addrs" {
7979

8080
module "vpc" {
8181
source = "terraform-ibm-modules/vpc/ibm"
82-
version = "1.5.1"
82+
version = "1.5.2"
8383
vpc_name = "${var.prefix}-vpc"
8484
resource_group_id = module.resource_group.resource_group_id
8585
locations = []
@@ -96,7 +96,7 @@ module "vpc" {
9696

9797
module "subnet_prefix" {
9898
source = "terraform-ibm-modules/vpc/ibm//modules/vpc-address-prefix"
99-
version = "1.5.1"
99+
version = "1.5.2"
100100
count = length(local.subnet_prefix)
101101
name = "${var.prefix}-z-${local.subnet_prefix[count.index].label}-${split("-", local.subnet_prefix[count.index].zone)[2]}"
102102
location = local.subnet_prefix[count.index].zone
@@ -108,7 +108,7 @@ module "subnet_prefix" {
108108
module "subnets" {
109109
depends_on = [module.subnet_prefix]
110110
source = "terraform-ibm-modules/vpc/ibm//modules/subnet"
111-
version = "1.5.1"
111+
version = "1.5.2"
112112
count = length(local.subnet_prefix)
113113
location = local.subnet_prefix[count.index].zone
114114
vpc_id = module.vpc.vpc.vpc_id
@@ -120,7 +120,7 @@ module "subnets" {
120120

121121
module "public_gateways" {
122122
source = "terraform-ibm-modules/vpc/ibm//modules/public-gateway"
123-
version = "1.5.1"
123+
version = "1.5.2"
124124
count = length(var.zones)
125125
vpc_id = module.vpc.vpc.vpc_id
126126
location = "${var.region}-${var.zones[count.index]}"
@@ -130,7 +130,7 @@ module "public_gateways" {
130130

131131
module "security_group" {
132132
source = "terraform-ibm-modules/vpc/ibm//modules/security-group"
133-
version = "1.5.1"
133+
version = "1.5.2"
134134
depends_on = [module.vpc]
135135
create_security_group = false
136136
resource_group_id = module.resource_group.resource_group_id
@@ -176,7 +176,7 @@ locals {
176176

177177
module "network_acl" {
178178
source = "terraform-ibm-modules/vpc/ibm//modules/network-acl"
179-
version = "1.5.1"
179+
version = "1.5.2"
180180
name = "${var.prefix}-vpc-acl"
181181
vpc_id = module.vpc.vpc.vpc_id
182182
resource_group_id = module.resource_group.resource_group_id
@@ -186,7 +186,7 @@ module "network_acl" {
186186
# OCP CLUSTER creation
187187
module "ocp_base" {
188188
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
189-
version = "3.55.4"
189+
version = "3.60.0"
190190
cluster_name = "${var.prefix}-vpc"
191191
resource_group_id = module.resource_group.resource_group_id
192192
region = var.region
@@ -231,7 +231,7 @@ data "ibm_cis" "cis_instance" {
231231

232232
module "vpes" {
233233
source = "terraform-ibm-modules/vpe-gateway/ibm"
234-
version = "4.7.5"
234+
version = "4.7.7"
235235
count = var.service_endpoints == "private" ? 1 : 0
236236
region = var.region
237237
prefix = "vpe"

examples/all-combined/privatecertificate.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ locals {
1313
# private certificate engine
1414
module "secrets_manager_private_secret_engine" {
1515
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
16-
version = "1.6.7"
16+
version = "1.6.11"
1717
secrets_manager_guid = local.sm_guid
1818
region = local.sm_region
1919
root_ca_name = var.pvt_ca_name != null ? var.pvt_ca_name : "pvt-${var.prefix}-project-root-ca"
@@ -30,7 +30,7 @@ module "secrets_manager_private_secret_engine" {
3030
module "secrets_manager_private_certificate" {
3131
depends_on = [module.secrets_manager_private_secret_engine]
3232
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
33-
version = "1.4.4"
33+
version = "1.4.7"
3434
cert_name = "${var.prefix}-sm-private-cert"
3535
cert_description = "Private certificate for ${local.pvt_cert_common_name}"
3636
cert_secrets_group_id = module.secrets_manager_group.secret_group_id

examples/all-combined/publiccertificate.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
module "secrets_manager_public_cert_engine" {
99
count = (var.acme_letsencrypt_private_key != null || (var.acme_letsencrypt_private_key_sm_id != null && var.acme_letsencrypt_private_key_secret_id != null && var.acme_letsencrypt_private_key_sm_region != null)) ? 1 : 0
1010
source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
11-
version = "1.1.9"
11+
version = "1.1.14"
1212
secrets_manager_guid = local.sm_guid
1313
region = local.sm_region
1414
internet_services_crn = data.ibm_cis.cis_instance.id

examples/all-combined/secretsmanager.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ resource "ibm_resource_instance" "secrets_manager" {
3636
# create secrets group for secrets
3737
module "secrets_manager_group" {
3838
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
39-
version = "1.3.13"
39+
version = "1.3.15"
4040
region = local.sm_region
4141
secrets_manager_guid = local.sm_guid
4242
secret_group_name = "${var.prefix}-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -49,7 +49,7 @@ module "secrets_manager_group" {
4949
# additional secrets manager secret group for service level secrets
5050
module "secrets_manager_group_acct" {
5151
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
52-
version = "1.3.13"
52+
version = "1.3.15"
5353
region = local.sm_region
5454
secrets_manager_guid = local.sm_guid
5555
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/all-combined/secretstore.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ locals {
5050
# create the arbitrary secret and store in secret manager
5151
module "sm_arbitrary_imagepull_secret" {
5252
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
53-
version = "1.7.0"
53+
version = "1.9.0"
5454
region = local.sm_region
5555
secrets_manager_guid = local.sm_guid
5656
secret_group_id = module.secrets_manager_group.secret_group_id

examples/all-combined/tpauth_cluster_sstore.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# creating a secrets group for clustersecretstore with trustedprofile auth
88
module "tp_clusterstore_secrets_manager_group" {
99
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
10-
version = "1.3.13"
10+
version = "1.3.15"
1111
region = local.sm_region
1212
secrets_manager_guid = local.sm_guid
1313
secret_group_name = "${var.prefix}-cpstore-tp-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -53,7 +53,7 @@ module "eso_clusterstore_tpauth" {
5353
# arbitrary secret to be synched through the clustersecretstore with TP authentication
5454
module "sm_cstore_arbitrary_secret_tp" {
5555
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
56-
version = "1.7.0"
56+
version = "1.9.0"
5757
region = local.sm_region
5858
secrets_manager_guid = local.sm_guid
5959
secret_group_id = module.tp_clusterstore_secrets_manager_group.secret_group_id

0 commit comments

Comments
 (0)