diff --git a/common-dev-assets b/common-dev-assets index 3c754bf..1df43f2 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit 3c754bf732e99f95e77014077d2d7ed4b29c55b0 +Subproject commit 1df43f2daf97a529d05350408d32a12f50d89fbf diff --git a/examples/all-combined/clusterstore.tf b/examples/all-combined/clusterstore.tf index 8cb4976..66b0c8f 100644 --- a/examples/all-combined/clusterstore.tf +++ b/examples/all-combined/clusterstore.tf @@ -39,7 +39,7 @@ locals { # Create username_password secret and store in secret manager module "sm_userpass_secret" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.secrets_manager_group.secret_group_id diff --git a/examples/all-combined/main.tf b/examples/all-combined/main.tf index 31a6ad2..d11d682 100644 --- a/examples/all-combined/main.tf +++ b/examples/all-combined/main.tf @@ -186,7 +186,7 @@ module "network_acl" { # OCP CLUSTER creation module "ocp_base" { source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.64.1" + version = "3.64.2" cluster_name = "${var.prefix}-vpc" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/examples/all-combined/privatecertificate.tf b/examples/all-combined/privatecertificate.tf index 8e162b0..c3fe7bb 100644 --- a/examples/all-combined/privatecertificate.tf +++ b/examples/all-combined/privatecertificate.tf @@ -13,7 +13,7 @@ locals { # private certificate engine module "secrets_manager_private_secret_engine" { source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm" - version = "1.9.3" + version = "1.9.4" secrets_manager_guid = local.sm_guid region = local.sm_region root_ca_name = var.pvt_ca_name != null ? var.pvt_ca_name : "pvt-${var.prefix}-project-root-ca" @@ -30,7 +30,7 @@ module "secrets_manager_private_secret_engine" { module "secrets_manager_private_certificate" { depends_on = [module.secrets_manager_private_secret_engine] source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.6.0" + version = "1.6.1" cert_name = "${var.prefix}-sm-private-cert" cert_description = "Private certificate for ${local.pvt_cert_common_name}" cert_secrets_group_id = module.secrets_manager_group.secret_group_id diff --git a/examples/all-combined/publiccertificate.tf b/examples/all-combined/publiccertificate.tf index a60aff2..0fe1751 100644 --- a/examples/all-combined/publiccertificate.tf +++ b/examples/all-combined/publiccertificate.tf @@ -8,7 +8,7 @@ module "secrets_manager_public_cert_engine" { count = (var.acme_letsencrypt_private_key != null || (var.acme_letsencrypt_private_key_sm_id != null && var.acme_letsencrypt_private_key_secret_id != null && var.acme_letsencrypt_private_key_sm_region != null)) ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm" - version = "1.2.4" + version = "1.2.5" secrets_manager_guid = local.sm_guid region = local.sm_region internet_services_crn = data.ibm_cis.cis_instance.id diff --git a/examples/all-combined/secretstore.tf b/examples/all-combined/secretstore.tf index 71c0ee9..a769064 100644 --- a/examples/all-combined/secretstore.tf +++ b/examples/all-combined/secretstore.tf @@ -50,7 +50,7 @@ locals { # create the arbitrary secret and store in secret manager module "sm_arbitrary_imagepull_secret" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.secrets_manager_group.secret_group_id diff --git a/examples/all-combined/tpauth_cluster_sstore.tf b/examples/all-combined/tpauth_cluster_sstore.tf index 5bbcbd4..ac423a3 100644 --- a/examples/all-combined/tpauth_cluster_sstore.tf +++ b/examples/all-combined/tpauth_cluster_sstore.tf @@ -53,7 +53,7 @@ module "eso_clusterstore_tpauth" { # arbitrary secret to be synched through the clustersecretstore with TP authentication module "sm_cstore_arbitrary_secret_tp" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.tp_clusterstore_secrets_manager_group.secret_group_id diff --git a/examples/all-combined/tpauth_namespaced_sstore.tf b/examples/all-combined/tpauth_namespaced_sstore.tf index 19e3a23..a905a6a 100644 --- a/examples/all-combined/tpauth_namespaced_sstore.tf +++ b/examples/all-combined/tpauth_namespaced_sstore.tf @@ -67,7 +67,7 @@ module "external_secrets_trusted_profiles" { module "sm_arbitrary_secrets_tp" { count = length(var.es_namespaces_tp) source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.tp_secrets_manager_groups[count.index].secret_group_id @@ -165,7 +165,7 @@ module "tp_secrets_manager_group_multi_2" { # arbitrary secret for secrets group 1 module "sm_arbitrary_secret_tp_multisg_1" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.tp_secrets_manager_group_multi_1.secret_group_id @@ -182,7 +182,7 @@ module "sm_arbitrary_secret_tp_multisg_1" { # arbitrary secret for secrets group 2 module "sm_arbitrary_secret_tp_multisg_2" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.tp_secrets_manager_group_multi_2.secret_group_id @@ -298,7 +298,7 @@ module "tp_secrets_manager_group_not_for_policy" { # arbitrary secret to use with external secret with auth using TP and policy not restricted to secrets group module "sm_arbitrary_secret_tp_nosecgroup" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.tp_secrets_manager_group_not_for_policy.secret_group_id diff --git a/examples/basic/main.tf b/examples/basic/main.tf index 57ef18c..632873e 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -198,7 +198,7 @@ module "network_acl" { # OCP CLUSTER creation module "ocp_base" { source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.64.1" + version = "3.64.2" cluster_name = "${var.prefix}-vpc" resource_group_id = module.resource_group.resource_group_id region = var.region @@ -370,7 +370,7 @@ locals { # Create username_password secret and store in secret manager module "sm_userpass_secret" { source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.secrets_manager_group_acct.secret_group_id diff --git a/examples/trusted-profiles-authentication/main.tf b/examples/trusted-profiles-authentication/main.tf index a1914bb..60288e7 100644 --- a/examples/trusted-profiles-authentication/main.tf +++ b/examples/trusted-profiles-authentication/main.tf @@ -71,7 +71,7 @@ resource "kubernetes_namespace" "examples" { module "sm_arbitrary_secrets" { count = length(kubernetes_namespace.examples) source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_id = module.secrets_manager_groups[count.index].secret_group_id diff --git a/solutions/fully-configurable/version.tf b/solutions/fully-configurable/version.tf index 0a86d33..960b97b 100644 --- a/solutions/fully-configurable/version.tf +++ b/solutions/fully-configurable/version.tf @@ -11,7 +11,7 @@ terraform { } ibm = { source = "IBM-Cloud/ibm" - version = "1.84.0" + version = "1.84.1" } } } diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index dcbe1cf..de4a363 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -184,7 +184,7 @@ module "network_acl" { # OCP CLUSTER creation module "ocp_base" { source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.64.1" + version = "3.64.2" cluster_name = "${var.prefix}-vpc" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/tests/go.mod b/tests/go.mod index 70d00b4..9f175be 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -7,7 +7,7 @@ toolchain go1.25.3 require ( github.com/gruntwork-io/terratest v0.51.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.14 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.15 gopkg.in/yaml.v3 v3.0.1 k8s.io/apimachinery v0.34.1 ) diff --git a/tests/go.sum b/tests/go.sum index c36bc4b..593cc93 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -451,8 +451,8 @@ github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXl github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.14 h1:glsxlvkJ3aEehvdWQi/g3sqDFA5XtJumwEieN+TfGzo= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.14/go.mod h1:o0c7STGyke4WOA45ddxNRMJu8JdPw07uICKMJQc1hNg= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.15 h1:vTLAB97MQ45Hfla67pIWYnb/Z5YuEzRLjQ6WN4GHWgI= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.15/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=