Skip to content

Commit b0cab5b

Browse files
authored
Merge branch 'main' into da_task_11723
2 parents b51ecc9 + 1a4b712 commit b0cab5b

File tree

12 files changed

+28
-41
lines changed

12 files changed

+28
-41
lines changed

README.md

Lines changed: 5 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -343,7 +343,7 @@ Labels: app=raw
343343
release=apikeynspace1-es-docker-uc
344344
Annotations: meta.helm.sh/release-name: apikeynspace1-es-docker-uc
345345
meta.helm.sh/release-namespace: apikeynspace1
346-
API Version: external-secrets.io/v1beta1
346+
API Version: external-secrets.io/v1
347347
Kind: ExternalSecret
348348
Metadata:
349349
(...)
@@ -469,23 +469,10 @@ data:
469469
## Usage
470470
471471
```hcl
472-
module "es_kubernetes_secret" {
473-
source = "../modules/eso-external-secret"
474-
es_kubernetes_secret_type = "dockerconfigjson"
475-
sm_secret_type = "iam_credentials"
476-
sm_secret_id = module.docker_config.serviceid_apikey_secret_id
477-
eso_setup = true
478-
es_kubernetes_namespaces = var.es_kubernetes_namespaces
479-
es_docker_email = "[email protected]"
480-
eso_generic_secret_apikey = data.ibm_secrets_manager_secret.secret_puller_secret.api_key # pragma: allowlist secret
481-
secrets_manager_guid = module.secrets_manager_iam_configuration.secrets_manager_guid
482-
region = "us-south"
483-
es_kubernetes_secret_name = "dockerconfigjson-iam"
484-
depends_on = [
485-
kubernetes_namespace.cluster_namespaces
486-
]
487-
es_kubernetes_secret_data_key = "apiKey"
488-
es_helm_rls_name = "es-docker-iam"
472+
# Replace "master" with a GIT release version to lock into a specific release
473+
module "external_secrets_operator" {
474+
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-external-secrets-operator.git?ref=master"
475+
eso_namespace = var.eso_namespace
489476
}
490477
```
491478

examples/all-combined/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ module "network_acl" {
186186
# OCP CLUSTER creation
187187
module "ocp_base" {
188188
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
189-
version = "3.46.17"
189+
version = "3.48.3"
190190
cluster_name = "${var.prefix}-vpc"
191191
resource_group_id = module.resource_group.resource_group_id
192192
region = var.region

examples/all-combined/privatecertificate.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ locals {
1313
# private certificate engine
1414
module "secrets_manager_private_secret_engine" {
1515
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
16-
version = "1.4.0"
16+
version = "1.5.2"
1717
secrets_manager_guid = local.sm_guid
1818
region = local.sm_region
1919
root_ca_name = var.pvt_ca_name != null ? var.pvt_ca_name : "pvt-${var.prefix}-project-root-ca"

examples/all-combined/secretsmanager.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ resource "ibm_resource_instance" "secrets_manager" {
3636
# create secrets group for secrets
3737
module "secrets_manager_group" {
3838
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
39-
version = "1.3.5"
39+
version = "1.3.7"
4040
region = local.sm_region
4141
secrets_manager_guid = local.sm_guid
4242
secret_group_name = "${var.prefix}-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -49,7 +49,7 @@ module "secrets_manager_group" {
4949
# additional secrets manager secret group for service level secrets
5050
module "secrets_manager_group_acct" {
5151
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
52-
version = "1.3.5"
52+
version = "1.3.7"
5353
region = local.sm_region
5454
secrets_manager_guid = local.sm_guid
5555
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/all-combined/tpauth_cluster_sstore.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# creating a secrets group for clustersecretstore with trustedprofile auth
88
module "tp_clusterstore_secrets_manager_group" {
99
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
10-
version = "1.3.5"
10+
version = "1.3.7"
1111
region = local.sm_region
1212
secrets_manager_guid = local.sm_guid
1313
secret_group_name = "${var.prefix}-cpstore-tp-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/all-combined/tpauth_namespaced_sstore.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ module "eso_tp_namespace_secretstores" {
4040
# creating a secrets group for each namespace to be used for namespaced secretstores with trustedprofile auth
4141
module "tp_secrets_manager_groups" {
4242
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
43-
version = "1.3.5"
43+
version = "1.3.7"
4444
count = length(var.es_namespaces_tp)
4545
region = local.sm_region
4646
secrets_manager_guid = local.sm_guid
@@ -140,7 +140,7 @@ module "eso_tp_namespace_secretstore_multisg" {
140140
# creating two secrets groups for a single namespace to test trusted profile policy on multiple secrets groups
141141
module "tp_secrets_manager_group_multi_1" {
142142
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
143-
version = "1.3.5"
143+
version = "1.3.7"
144144
region = local.sm_region
145145
secrets_manager_guid = local.sm_guid
146146
secret_group_name = "${var.prefix}-tp-secret-group-multisg-1" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -152,7 +152,7 @@ module "tp_secrets_manager_group_multi_1" {
152152

153153
module "tp_secrets_manager_group_multi_2" {
154154
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
155-
version = "1.3.5"
155+
version = "1.3.7"
156156
region = local.sm_region
157157
secrets_manager_guid = local.sm_guid
158158
secret_group_name = "${var.prefix}-tp-secret-group-multisg-21" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -285,7 +285,7 @@ module "eso_tp_namespace_secretstore_nosecgroup" {
285285
# creating secrets group for a single namespace to test trusted profile policy without any secret group in the TP policy
286286
module "tp_secrets_manager_group_not_for_policy" {
287287
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
288-
version = "1.3.5"
288+
version = "1.3.7"
289289
region = local.sm_region
290290
secrets_manager_guid = local.sm_guid
291291
secret_group_name = "${var.prefix}-tp-secret-group-not-for-policy" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/basic/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ module "network_acl" {
198198
# OCP CLUSTER creation
199199
module "ocp_base" {
200200
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
201-
version = "3.46.17"
201+
version = "3.48.3"
202202
cluster_name = "${var.prefix}-vpc"
203203
resource_group_id = module.resource_group.resource_group_id
204204
region = var.region
@@ -267,7 +267,7 @@ resource "ibm_resource_instance" "secrets_manager" {
267267
# Additional Secrets-Manager Secret-Group for SERVICE level secrets
268268
module "secrets_manager_group_acct" {
269269
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
270-
version = "1.3.5"
270+
version = "1.3.7"
271271
region = local.sm_region
272272
secrets_manager_guid = local.sm_guid
273273
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/basic/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ terraform {
1515
}
1616
ibm = {
1717
source = "IBM-Cloud/ibm"
18-
version = "= 1.76.0"
18+
version = "= 1.78.2"
1919
}
2020
null = {
2121
source = "hashicorp/null"

examples/trusted-profiles-authentication/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ resource "ibm_resource_instance" "secrets_manager" {
4141

4242
module "secrets_manager_groups" {
4343
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
44-
version = "1.3.5"
44+
version = "1.3.7"
4545
count = length(kubernetes_namespace.examples)
4646
region = local.sm_region
4747
secrets_manager_guid = local.sm_guid

modules/eso-clusterstore/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ resource "helm_release" "cluster_secret_store_apikey" {
3636
values = [
3737
<<-EOF
3838
resources:
39-
- apiVersion: external-secrets.io/v1beta1
39+
- apiVersion: external-secrets.io/v1
4040
kind: ClusterSecretStore
4141
metadata:
4242
name: "${var.clusterstore_name}"
@@ -70,7 +70,7 @@ resource "helm_release" "cluster_secret_store_tp" {
7070
values = [
7171
<<-EOF
7272
resources:
73-
- apiVersion: external-secrets.io/v1beta1
73+
- apiVersion: external-secrets.io/v1
7474
kind: ClusterSecretStore
7575
metadata:
7676
name: "${var.clusterstore_name}"

0 commit comments

Comments
 (0)