diff --git a/README.md b/README.md index 79599aa..bf72330 100644 --- a/README.md +++ b/README.md @@ -515,7 +515,7 @@ You need the following permissions to run this module. | Name | Description | Type | Default | Required | |------|-------------|------|---------|:--------:| | [eso\_chart\_location](#input\_eso\_chart\_location) | The location of the External Secrets Operator Helm chart. | `string` | `"https://charts.external-secrets.io"` | no | -| [eso\_chart\_version](#input\_eso\_chart\_version) | The version of the External Secrets Operator Helm chart. Ensure that the chart version is compatible with the image version specified in eso\_image\_version. | `string` | `"0.20.2"` | no | +| [eso\_chart\_version](#input\_eso\_chart\_version) | The version of the External Secrets Operator Helm chart. Ensure that the chart version is compatible with the image version specified in eso\_image\_version. | `string` | `"0.20.3"` | no | | [eso\_cluster\_nodes\_configuration](#input\_eso\_cluster\_nodes\_configuration) | Configuration to use to customise ESO deployment on specific cluster nodes. Setting appropriate values will result in customising ESO helm release. Default value is null to keep ESO standard deployment. |
object({
nodeSelector = object({
label = string
value = string
})
tolerations = object({
key = string
operator = string
value = string
effect = string
})
})
| `null` | no | | [eso\_enroll\_in\_servicemesh](#input\_eso\_enroll\_in\_servicemesh) | Flag to enroll ESO into istio servicemesh | `bool` | `false` | no | | [eso\_image](#input\_eso\_image) | The External Secrets Operator image in the format of `[registry-url]/[namespace]/[image]`. | `string` | `"ghcr.io/external-secrets/external-secrets"` | no | diff --git a/examples/all-combined/main.tf b/examples/all-combined/main.tf index ddca4a7..31a6ad2 100644 --- a/examples/all-combined/main.tf +++ b/examples/all-combined/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -186,7 +186,7 @@ module "network_acl" { # OCP CLUSTER creation module "ocp_base" { source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.64.0" + version = "3.64.1" cluster_name = "${var.prefix}-vpc" resource_group_id = module.resource_group.resource_group_id region = var.region @@ -231,7 +231,7 @@ data "ibm_cis" "cis_instance" { module "vpes" { source = "terraform-ibm-modules/vpe-gateway/ibm" - version = "4.7.10" + version = "4.7.11" count = var.service_endpoints == "private" ? 1 : 0 region = var.region prefix = "vpe" diff --git a/examples/all-combined/privatecertificate.tf b/examples/all-combined/privatecertificate.tf index 9ffe489..8e162b0 100644 --- a/examples/all-combined/privatecertificate.tf +++ b/examples/all-combined/privatecertificate.tf @@ -30,7 +30,7 @@ module "secrets_manager_private_secret_engine" { module "secrets_manager_private_certificate" { depends_on = [module.secrets_manager_private_secret_engine] source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.5.3" + version = "1.6.0" cert_name = "${var.prefix}-sm-private-cert" cert_description = "Private certificate for ${local.pvt_cert_common_name}" cert_secrets_group_id = module.secrets_manager_group.secret_group_id diff --git a/examples/all-combined/publiccertificate.tf b/examples/all-combined/publiccertificate.tf index 7454ac0..a60aff2 100644 --- a/examples/all-combined/publiccertificate.tf +++ b/examples/all-combined/publiccertificate.tf @@ -8,7 +8,7 @@ module "secrets_manager_public_cert_engine" { count = (var.acme_letsencrypt_private_key != null || (var.acme_letsencrypt_private_key_sm_id != null && var.acme_letsencrypt_private_key_secret_id != null && var.acme_letsencrypt_private_key_sm_region != null)) ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm" - version = "1.2.3" + version = "1.2.4" secrets_manager_guid = local.sm_guid region = local.sm_region internet_services_crn = data.ibm_cis.cis_instance.id diff --git a/examples/basic/main.tf b/examples/basic/main.tf index 4cc7aae..57ef18c 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -18,7 +18,7 @@ locals { module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -198,7 +198,7 @@ module "network_acl" { # OCP CLUSTER creation module "ocp_base" { source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.64.0" + version = "3.64.1" cluster_name = "${var.prefix}-vpc" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/examples/trusted-profiles-authentication/main.tf b/examples/trusted-profiles-authentication/main.tf index a53c9fa..a1914bb 100644 --- a/examples/trusted-profiles-authentication/main.tf +++ b/examples/trusted-profiles-authentication/main.tf @@ -1,6 +1,6 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -166,7 +166,7 @@ module "external_secrets" { module "vpes" { source = "terraform-ibm-modules/vpe-gateway/ibm" - version = "4.7.10" + version = "4.7.11" count = var.service_endpoints == "private" ? 1 : 0 region = var.region prefix = "vpe" diff --git a/solutions/fully-configurable/variables.tf b/solutions/fully-configurable/variables.tf index 3b46aed..1e05337 100644 --- a/solutions/fully-configurable/variables.tf +++ b/solutions/fully-configurable/variables.tf @@ -164,7 +164,7 @@ variable "eso_chart_location" { variable "eso_chart_version" { type = string description = "The version of the External Secrets Operator Helm chart. Ensure that the chart version is compatible with the image version specified in eso_image_version." - default = "0.20.2" # registryUrl: charts.external-secrets.io + default = "0.20.3" # registryUrl: charts.external-secrets.io nullable = false } diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index 610778f..dcbe1cf 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -184,7 +184,7 @@ module "network_acl" { # OCP CLUSTER creation module "ocp_base" { source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.64.0" + version = "3.64.1" cluster_name = "${var.prefix}-vpc" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/tests/go.mod b/tests/go.mod index 1525b41..70d00b4 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -7,7 +7,7 @@ toolchain go1.25.3 require ( github.com/gruntwork-io/terratest v0.51.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.13 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.14 gopkg.in/yaml.v3 v3.0.1 k8s.io/apimachinery v0.34.1 ) diff --git a/tests/go.sum b/tests/go.sum index 2a026c8..c36bc4b 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -451,8 +451,8 @@ github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXl github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.13 h1:jINbZDyvKbtUimsqF4XMTb5l4QWiGNUazvRBQiGmCX8= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.13/go.mod h1:bKjJy3Hk26Vc++TmB5PDlTzDb312YemSkZdznAR51Wc= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.14 h1:glsxlvkJ3aEehvdWQi/g3sqDFA5XtJumwEieN+TfGzo= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.14/go.mod h1:o0c7STGyke4WOA45ddxNRMJu8JdPw07uICKMJQc1hNg= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk= diff --git a/variables.tf b/variables.tf index cf8c168..2c85672 100644 --- a/variables.tf +++ b/variables.tf @@ -95,7 +95,7 @@ variable "eso_chart_location" { variable "eso_chart_version" { type = string description = "The version of the External Secrets Operator Helm chart. Ensure that the chart version is compatible with the image version specified in eso_image_version." - default = "0.20.2" # registryUrl: charts.external-secrets.io + default = "0.20.3" # registryUrl: charts.external-secrets.io nullable = false }