From fec706d7c91acabb4565aa6da1eca0cb700956b7 Mon Sep 17 00:00:00 2001 From: Terraform IBM Modules Operations Date: Sun, 20 Jul 2025 14:05:07 +0000 Subject: [PATCH] fix(deps): update terraform dependencies --- examples/all-combined/main.tf | 2 +- examples/all-combined/publiccertificate.tf | 2 +- examples/all-combined/secretsmanager.tf | 4 ++-- examples/all-combined/tpauth_cluster_sstore.tf | 2 +- examples/all-combined/tpauth_namespaced_sstore.tf | 8 ++++---- examples/basic/main.tf | 4 ++-- examples/trusted-profiles-authentication/main.tf | 2 +- solutions/fully-configurable/main.tf | 8 ++++---- tests/existing-resources/main.tf | 2 +- 9 files changed, 17 insertions(+), 17 deletions(-) diff --git a/examples/all-combined/main.tf b/examples/all-combined/main.tf index 36ffafbb..8c77448d 100644 --- a/examples/all-combined/main.tf +++ b/examples/all-combined/main.tf @@ -186,7 +186,7 @@ module "network_acl" { # OCP CLUSTER creation module "ocp_base" { source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.52.2" + version = "3.52.3" cluster_name = "${var.prefix}-vpc" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/examples/all-combined/publiccertificate.tf b/examples/all-combined/publiccertificate.tf index 57d2a98d..f66d167b 100644 --- a/examples/all-combined/publiccertificate.tf +++ b/examples/all-combined/publiccertificate.tf @@ -8,7 +8,7 @@ module "secrets_manager_public_cert_engine" { count = (var.acme_letsencrypt_private_key != null || (var.acme_letsencrypt_private_key_sm_id != null && var.acme_letsencrypt_private_key_secret_id != null && var.acme_letsencrypt_private_key_sm_region != null)) ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm" - version = "1.1.5" + version = "1.1.6" secrets_manager_guid = local.sm_guid region = local.sm_region internet_services_crn = data.ibm_cis.cis_instance.id diff --git a/examples/all-combined/secretsmanager.tf b/examples/all-combined/secretsmanager.tf index 6d5f8c83..f7315600 100644 --- a/examples/all-combined/secretsmanager.tf +++ b/examples/all-combined/secretsmanager.tf @@ -36,7 +36,7 @@ resource "ibm_resource_instance" "secrets_manager" { # create secrets group for secrets module "secrets_manager_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -49,7 +49,7 @@ module "secrets_manager_group" { # additional secrets manager secret group for service level secrets module "secrets_manager_group_acct" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid #tfsec:ignore:general-secrets-no-plaintext-exposure diff --git a/examples/all-combined/tpauth_cluster_sstore.tf b/examples/all-combined/tpauth_cluster_sstore.tf index 5ae3bb0b..8764fb25 100644 --- a/examples/all-combined/tpauth_cluster_sstore.tf +++ b/examples/all-combined/tpauth_cluster_sstore.tf @@ -7,7 +7,7 @@ # creating a secrets group for clustersecretstore with trustedprofile auth module "tp_clusterstore_secrets_manager_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-cpstore-tp-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value diff --git a/examples/all-combined/tpauth_namespaced_sstore.tf b/examples/all-combined/tpauth_namespaced_sstore.tf index b5450143..bc68c4af 100644 --- a/examples/all-combined/tpauth_namespaced_sstore.tf +++ b/examples/all-combined/tpauth_namespaced_sstore.tf @@ -40,7 +40,7 @@ module "eso_tp_namespace_secretstores" { # creating a secrets group for each namespace to be used for namespaced secretstores with trustedprofile auth module "tp_secrets_manager_groups" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" count = length(var.es_namespaces_tp) region = local.sm_region secrets_manager_guid = local.sm_guid @@ -140,7 +140,7 @@ module "eso_tp_namespace_secretstore_multisg" { # creating two secrets groups for a single namespace to test trusted profile policy on multiple secrets groups module "tp_secrets_manager_group_multi_1" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-tp-secret-group-multisg-1" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -152,7 +152,7 @@ module "tp_secrets_manager_group_multi_1" { module "tp_secrets_manager_group_multi_2" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-tp-secret-group-multisg-21" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -285,7 +285,7 @@ module "eso_tp_namespace_secretstore_nosecgroup" { # creating secrets group for a single namespace to test trusted profile policy without any secret group in the TP policy module "tp_secrets_manager_group_not_for_policy" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-tp-secret-group-not-for-policy" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value diff --git a/examples/basic/main.tf b/examples/basic/main.tf index 8ad69aa1..59d1a78a 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -198,7 +198,7 @@ module "network_acl" { # OCP CLUSTER creation module "ocp_base" { source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.52.2" + version = "3.52.3" cluster_name = "${var.prefix}-vpc" resource_group_id = module.resource_group.resource_group_id region = var.region @@ -267,7 +267,7 @@ resource "ibm_resource_instance" "secrets_manager" { # Additional Secrets-Manager Secret-Group for SERVICE level secrets module "secrets_manager_group_acct" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid #tfsec:ignore:general-secrets-no-plaintext-exposure diff --git a/examples/trusted-profiles-authentication/main.tf b/examples/trusted-profiles-authentication/main.tf index f660a2e0..e77536b4 100644 --- a/examples/trusted-profiles-authentication/main.tf +++ b/examples/trusted-profiles-authentication/main.tf @@ -41,7 +41,7 @@ resource "ibm_resource_instance" "secrets_manager" { module "secrets_manager_groups" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" count = length(kubernetes_namespace.examples) region = local.sm_region secrets_manager_guid = local.sm_guid diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 974ffd93..d0ab85b4 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -107,7 +107,7 @@ module "cluster_secrets_stores_service_secrets_groups" { for idx, element in local.cluster_secrets_stores_service_secrets_groups_list : element.key => element }) source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -167,7 +167,7 @@ module "cluster_secrets_stores_account_secrets_groups" { } if(cluster_secrets_store.existing_account_secrets_group_id == null || cluster_secrets_store.existing_account_secrets_group_id == "") && cluster_secrets_store.account_secrets_group_name != null }) source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -366,7 +366,7 @@ module "secrets_stores_service_secrets_groups" { for idx, element in local.secrets_stores_service_secrets_groups_list : element.key => element }) source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -426,7 +426,7 @@ module "secrets_stores_account_secrets_groups" { } if(secrets_store.existing_account_secrets_group_id == null || secrets_store.existing_account_secrets_group_id == "") && secrets_store.account_secrets_group_name != null }) source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.10" + version = "1.3.11" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index 6e610f88..fd13dd56 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -184,7 +184,7 @@ module "network_acl" { # OCP CLUSTER creation module "ocp_base" { source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.52.2" + version = "3.52.3" cluster_name = "${var.prefix}-vpc" resource_group_id = module.resource_group.resource_group_id region = var.region