Skip to content

Commit cbc20d2

Browse files
fix(deps): update dependencies
1 parent af6b645 commit cbc20d2

File tree

12 files changed

+28
-28
lines changed

12 files changed

+28
-28
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ This module automates the installation and configuration of the [External Secret
1818
* [eso-secretstore](./modules/eso-secretstore)
1919
* [eso-trusted-profile](./modules/eso-trusted-profile)
2020
* [Examples](./examples)
21-
* [Basic Example](./examples/basic)
22-
* [Example that uses trusted profiles (container authentication)](./examples/trusted-profiles-authentication)
23-
* [Example to deploy the External Secret Operator and to create a different set of resources in terms of secrets, secret groups, stores and auth configurations](./examples/all-combined)
24-
* [ImagePull API key Secrets Manager](./examples/all-combined/imagepull-apikey-secrets-manager)
21+
* <div style="display: inline-block;"><a href="./examples/all-combined">Example to deploy the External Secret Operator and to create a different set of resources in terms of secrets, secret groups, stores and auth configurations</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=eso-all-combined-example&repository=github.com/terraform-ibm-modules/terraform-ibm-external-secrets-operator/tree/main/examples/all-combined" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
22+
* <div style="display: inline-block;"><a href="./examples/all-combined/imagepull-apikey-secrets-manager">ImagePull API key Secrets Manager</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=eso-imagepull-apikey-secrets-manager-example&repository=github.com/terraform-ibm-modules/terraform-ibm-external-secrets-operator/tree/main/examples/all-combined/imagepull-apikey-secrets-manager" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
23+
* <div style="display: inline-block;"><a href="./examples/basic">Basic Example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=eso-basic-example&repository=github.com/terraform-ibm-modules/terraform-ibm-external-secrets-operator/tree/main/examples/basic" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
24+
* <div style="display: inline-block;"><a href="./examples/trusted-profiles-authentication">Example that uses trusted profiles (container authentication)</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=eso-trusted-profiles-authentication-example&repository=github.com/terraform-ibm-modules/terraform-ibm-external-secrets-operator/tree/main/examples/trusted-profiles-authentication" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
2525
* [Contributing](#contributing)
2626
<!-- END OVERVIEW HOOK -->
2727

examples/all-combined/privatecertificate.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ module "secrets_manager_private_secret_engine" {
3030
module "secrets_manager_private_certificate" {
3131
depends_on = [module.secrets_manager_private_secret_engine]
3232
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
33-
version = "1.7.4"
33+
version = "1.7.5"
3434
cert_name = "${var.prefix}-sm-private-cert"
3535
cert_description = "Private certificate for ${local.pvt_cert_common_name}"
3636
cert_secrets_group_id = module.secrets_manager_group.secret_group_id

examples/all-combined/publiccertificate.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
module "secrets_manager_public_cert_engine" {
99
count = (var.acme_letsencrypt_private_key != null || (var.acme_letsencrypt_private_key_sm_id != null && var.acme_letsencrypt_private_key_secret_id != null && var.acme_letsencrypt_private_key_sm_region != null)) ? 1 : 0
1010
source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
11-
version = "1.4.1"
11+
version = "1.4.2"
1212
secrets_manager_guid = local.sm_guid
1313
region = local.sm_region
1414
internet_services_crn = data.ibm_cis.cis_instance.id

examples/all-combined/secretsmanager.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ resource "ibm_resource_instance" "secrets_manager" {
3636
# create secrets group for secrets
3737
module "secrets_manager_group" {
3838
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
39-
version = "1.3.15"
39+
version = "1.3.16"
4040
region = local.sm_region
4141
secrets_manager_guid = local.sm_guid
4242
secret_group_name = "${var.prefix}-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -49,7 +49,7 @@ module "secrets_manager_group" {
4949
# additional secrets manager secret group for service level secrets
5050
module "secrets_manager_group_acct" {
5151
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
52-
version = "1.3.15"
52+
version = "1.3.16"
5353
region = local.sm_region
5454
secrets_manager_guid = local.sm_guid
5555
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/all-combined/tpauth_cluster_sstore.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# creating a secrets group for clustersecretstore with trustedprofile auth
88
module "tp_clusterstore_secrets_manager_group" {
99
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
10-
version = "1.3.15"
10+
version = "1.3.16"
1111
region = local.sm_region
1212
secrets_manager_guid = local.sm_guid
1313
secret_group_name = "${var.prefix}-cpstore-tp-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/all-combined/tpauth_namespaced_sstore.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ module "eso_tp_namespace_secretstores" {
4040
# creating a secrets group for each namespace to be used for namespaced secretstores with trustedprofile auth
4141
module "tp_secrets_manager_groups" {
4242
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
43-
version = "1.3.15"
43+
version = "1.3.16"
4444
count = length(var.es_namespaces_tp)
4545
region = local.sm_region
4646
secrets_manager_guid = local.sm_guid
@@ -140,7 +140,7 @@ module "eso_tp_namespace_secretstore_multisg" {
140140
# creating two secrets groups for a single namespace to test trusted profile policy on multiple secrets groups
141141
module "tp_secrets_manager_group_multi_1" {
142142
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
143-
version = "1.3.15"
143+
version = "1.3.16"
144144
region = local.sm_region
145145
secrets_manager_guid = local.sm_guid
146146
secret_group_name = "${var.prefix}-tp-secret-group-multisg-1" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -152,7 +152,7 @@ module "tp_secrets_manager_group_multi_1" {
152152

153153
module "tp_secrets_manager_group_multi_2" {
154154
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
155-
version = "1.3.15"
155+
version = "1.3.16"
156156
region = local.sm_region
157157
secrets_manager_guid = local.sm_guid
158158
secret_group_name = "${var.prefix}-tp-secret-group-multisg-21" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -285,7 +285,7 @@ module "eso_tp_namespace_secretstore_nosecgroup" {
285285
# creating secrets group for a single namespace to test trusted profile policy without any secret group in the TP policy
286286
module "tp_secrets_manager_group_not_for_policy" {
287287
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
288-
version = "1.3.15"
288+
version = "1.3.16"
289289
region = local.sm_region
290290
secrets_manager_guid = local.sm_guid
291291
secret_group_name = "${var.prefix}-tp-secret-group-not-for-policy" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ resource "ibm_resource_instance" "secrets_manager" {
267267
# Additional Secrets-Manager Secret-Group for SERVICE level secrets
268268
module "secrets_manager_group_acct" {
269269
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
270-
version = "1.3.15"
270+
version = "1.3.16"
271271
region = local.sm_region
272272
secrets_manager_guid = local.sm_guid
273273
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/trusted-profiles-authentication/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ resource "ibm_resource_instance" "secrets_manager" {
4141

4242
module "secrets_manager_groups" {
4343
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
44-
version = "1.3.15"
44+
version = "1.3.16"
4545
count = length(kubernetes_namespace.examples)
4646
region = local.sm_region
4747
secrets_manager_guid = local.sm_guid

solutions/fully-configurable/main.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ locals {
55
# parsing cluster crn to collect the cluster ID and the region it is deployed into
66
module "crn_parser_cluster" {
77
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
8-
version = "1.2.0"
8+
version = "1.3.0"
99
crn = var.existing_cluster_crn
1010
}
1111

1212
# parsing secrets manager crn to collect the secrets manager ID and its region
1313
module "crn_parser_sm" {
1414
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
15-
version = "1.2.0"
15+
version = "1.3.0"
1616
crn = var.existing_secrets_manager_crn
1717
}
1818

@@ -107,7 +107,7 @@ module "cluster_secrets_stores_service_secrets_groups" {
107107
for idx, element in local.cluster_secrets_stores_service_secrets_groups_list : element.key => element
108108
})
109109
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
110-
version = "1.3.15"
110+
version = "1.3.16"
111111
region = local.sm_region
112112
secrets_manager_guid = local.sm_guid
113113
secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -167,7 +167,7 @@ module "cluster_secrets_stores_account_secrets_groups" {
167167
} if(cluster_secrets_store.existing_account_secrets_group_id == null || cluster_secrets_store.existing_account_secrets_group_id == "") && cluster_secrets_store.account_secrets_group_name != null
168168
})
169169
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
170-
version = "1.3.15"
170+
version = "1.3.16"
171171
region = local.sm_region
172172
secrets_manager_guid = local.sm_guid
173173
secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -366,7 +366,7 @@ module "secrets_stores_service_secrets_groups" {
366366
for idx, element in local.secrets_stores_service_secrets_groups_list : element.key => element
367367
})
368368
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
369-
version = "1.3.15"
369+
version = "1.3.16"
370370
region = local.sm_region
371371
secrets_manager_guid = local.sm_guid
372372
secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -426,7 +426,7 @@ module "secrets_stores_account_secrets_groups" {
426426
} if(secrets_store.existing_account_secrets_group_id == null || secrets_store.existing_account_secrets_group_id == "") && secrets_store.account_secrets_group_name != null
427427
})
428428
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
429-
version = "1.3.15"
429+
version = "1.3.16"
430430
region = local.sm_region
431431
secrets_manager_guid = local.sm_guid
432432
secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

0 commit comments

Comments
 (0)