diff --git a/README.md b/README.md index c9743c2..b0db96d 100644 --- a/README.md +++ b/README.md @@ -18,10 +18,10 @@ This module automates the installation and configuration of the [External Secret * [eso-secretstore](./modules/eso-secretstore) * [eso-trusted-profile](./modules/eso-trusted-profile) * [Examples](./examples) - * [Basic Example](./examples/basic) - * [Example that uses trusted profiles (container authentication)](./examples/trusted-profiles-authentication) - * [Example to deploy the External Secret Operator and to create a different set of resources in terms of secrets, secret groups, stores and auth configurations](./examples/all-combined) - * [ImagePull API key Secrets Manager](./examples/all-combined/imagepull-apikey-secrets-manager) + *
Example to deploy the External Secret Operator and to create a different set of resources in terms of secrets, secret groups, stores and auth configurations
Deploy to IBM Cloud button
+ *
ImagePull API key Secrets Manager
Deploy to IBM Cloud button
+ *
Basic Example
Deploy to IBM Cloud button
+ *
Example that uses trusted profiles (container authentication)
Deploy to IBM Cloud button
* [Contributing](#contributing) diff --git a/common-dev-assets b/common-dev-assets index 6c55997..fc1a272 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit 6c559972950f9eb3fdf19b38f51b01008d0d469a +Subproject commit fc1a27254f57a7815ba98c523fc1ef0c73df6790 diff --git a/examples/all-combined/privatecertificate.tf b/examples/all-combined/privatecertificate.tf index 3c13cc8..8233d40 100644 --- a/examples/all-combined/privatecertificate.tf +++ b/examples/all-combined/privatecertificate.tf @@ -30,7 +30,7 @@ module "secrets_manager_private_secret_engine" { module "secrets_manager_private_certificate" { depends_on = [module.secrets_manager_private_secret_engine] source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.7.4" + version = "1.7.5" cert_name = "${var.prefix}-sm-private-cert" cert_description = "Private certificate for ${local.pvt_cert_common_name}" cert_secrets_group_id = module.secrets_manager_group.secret_group_id diff --git a/examples/all-combined/publiccertificate.tf b/examples/all-combined/publiccertificate.tf index 2238a7d..2470392 100644 --- a/examples/all-combined/publiccertificate.tf +++ b/examples/all-combined/publiccertificate.tf @@ -8,7 +8,7 @@ module "secrets_manager_public_cert_engine" { count = (var.acme_letsencrypt_private_key != null || (var.acme_letsencrypt_private_key_sm_id != null && var.acme_letsencrypt_private_key_secret_id != null && var.acme_letsencrypt_private_key_sm_region != null)) ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm" - version = "1.4.1" + version = "1.4.2" secrets_manager_guid = local.sm_guid region = local.sm_region internet_services_crn = data.ibm_cis.cis_instance.id diff --git a/examples/all-combined/secretsmanager.tf b/examples/all-combined/secretsmanager.tf index 0685bbb..92251c6 100644 --- a/examples/all-combined/secretsmanager.tf +++ b/examples/all-combined/secretsmanager.tf @@ -36,7 +36,7 @@ resource "ibm_resource_instance" "secrets_manager" { # create secrets group for secrets module "secrets_manager_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -49,7 +49,7 @@ module "secrets_manager_group" { # additional secrets manager secret group for service level secrets module "secrets_manager_group_acct" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid #tfsec:ignore:general-secrets-no-plaintext-exposure diff --git a/examples/all-combined/tpauth_cluster_sstore.tf b/examples/all-combined/tpauth_cluster_sstore.tf index ac423a3..b84031c 100644 --- a/examples/all-combined/tpauth_cluster_sstore.tf +++ b/examples/all-combined/tpauth_cluster_sstore.tf @@ -7,7 +7,7 @@ # creating a secrets group for clustersecretstore with trustedprofile auth module "tp_clusterstore_secrets_manager_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-cpstore-tp-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value diff --git a/examples/all-combined/tpauth_namespaced_sstore.tf b/examples/all-combined/tpauth_namespaced_sstore.tf index a905a6a..a8e33a4 100644 --- a/examples/all-combined/tpauth_namespaced_sstore.tf +++ b/examples/all-combined/tpauth_namespaced_sstore.tf @@ -40,7 +40,7 @@ module "eso_tp_namespace_secretstores" { # creating a secrets group for each namespace to be used for namespaced secretstores with trustedprofile auth module "tp_secrets_manager_groups" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" count = length(var.es_namespaces_tp) region = local.sm_region secrets_manager_guid = local.sm_guid @@ -140,7 +140,7 @@ module "eso_tp_namespace_secretstore_multisg" { # creating two secrets groups for a single namespace to test trusted profile policy on multiple secrets groups module "tp_secrets_manager_group_multi_1" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-tp-secret-group-multisg-1" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -152,7 +152,7 @@ module "tp_secrets_manager_group_multi_1" { module "tp_secrets_manager_group_multi_2" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-tp-secret-group-multisg-21" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -285,7 +285,7 @@ module "eso_tp_namespace_secretstore_nosecgroup" { # creating secrets group for a single namespace to test trusted profile policy without any secret group in the TP policy module "tp_secrets_manager_group_not_for_policy" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = "${var.prefix}-tp-secret-group-not-for-policy" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value diff --git a/examples/basic/main.tf b/examples/basic/main.tf index 9420f01..b2b78b4 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -267,7 +267,7 @@ resource "ibm_resource_instance" "secrets_manager" { # Additional Secrets-Manager Secret-Group for SERVICE level secrets module "secrets_manager_group_acct" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid #tfsec:ignore:general-secrets-no-plaintext-exposure diff --git a/examples/trusted-profiles-authentication/main.tf b/examples/trusted-profiles-authentication/main.tf index 7f83ca3..2cf8cb9 100644 --- a/examples/trusted-profiles-authentication/main.tf +++ b/examples/trusted-profiles-authentication/main.tf @@ -41,7 +41,7 @@ resource "ibm_resource_instance" "secrets_manager" { module "secrets_manager_groups" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" count = length(kubernetes_namespace.examples) region = local.sm_region secrets_manager_guid = local.sm_guid diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 0012682..a616f4d 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -5,14 +5,14 @@ locals { # parsing cluster crn to collect the cluster ID and the region it is deployed into module "crn_parser_cluster" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.existing_cluster_crn } # parsing secrets manager crn to collect the secrets manager ID and its region module "crn_parser_sm" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.existing_secrets_manager_crn } @@ -107,7 +107,7 @@ module "cluster_secrets_stores_service_secrets_groups" { for idx, element in local.cluster_secrets_stores_service_secrets_groups_list : element.key => element }) source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -167,7 +167,7 @@ module "cluster_secrets_stores_account_secrets_groups" { } if(cluster_secrets_store.existing_account_secrets_group_id == null || cluster_secrets_store.existing_account_secrets_group_id == "") && cluster_secrets_store.account_secrets_group_name != null }) source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -366,7 +366,7 @@ module "secrets_stores_service_secrets_groups" { for idx, element in local.secrets_stores_service_secrets_groups_list : element.key => element }) source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value @@ -426,7 +426,7 @@ module "secrets_stores_account_secrets_groups" { } if(secrets_store.existing_account_secrets_group_id == null || secrets_store.existing_account_secrets_group_id == "") && secrets_store.account_secrets_group_name != null }) source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.sm_region secrets_manager_guid = local.sm_guid secret_group_name = each.value.name # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value diff --git a/tests/go.mod b/tests/go.mod index 128c20a..a7e99e9 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -7,7 +7,7 @@ toolchain go1.25.4 require ( github.com/gruntwork-io/terratest v0.52.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.19 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20 gopkg.in/yaml.v3 v3.0.1 k8s.io/apimachinery v0.34.1 ) @@ -19,7 +19,7 @@ require ( github.com/IBM-Cloud/power-go-client v1.13.0 // indirect github.com/IBM/cloud-databases-go-sdk v0.8.1 // indirect github.com/IBM/go-sdk-core/v5 v5.21.0 // indirect - github.com/IBM/platform-services-go-sdk v0.89.0 // indirect + github.com/IBM/platform-services-go-sdk v0.90.0 // indirect github.com/IBM/project-go-sdk v0.3.9 // indirect github.com/IBM/schematics-go-sdk v0.4.0 // indirect github.com/IBM/vpc-go-sdk v1.0.2 // indirect diff --git a/tests/go.sum b/tests/go.sum index 5bc777c..5baaa96 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -13,8 +13,8 @@ github.com/IBM/cloud-databases-go-sdk v0.8.1/go.mod h1:JYucI1PdwqbAd8XGdDAchxzxR github.com/IBM/go-sdk-core/v5 v5.9.2/go.mod h1:YlOwV9LeuclmT/qi/LAK2AsobbAP42veV0j68/rlZsE= github.com/IBM/go-sdk-core/v5 v5.21.0 h1:DUnYhvC4SoC8T84rx5omnhY3+xcQg/Whyoa3mDPIMkk= github.com/IBM/go-sdk-core/v5 v5.21.0/go.mod h1:Q3BYO6iDA2zweQPDGbNTtqft5tDcEpm6RTuqMlPcvbw= -github.com/IBM/platform-services-go-sdk v0.89.0 h1:fIvKR1bQchPoMUXQf69gaRKak/giVAkRDISiAX8TlE8= -github.com/IBM/platform-services-go-sdk v0.89.0/go.mod h1:aGD045m6I8pfcB77wft8w2cHqWOJjcM3YSSV55BX0Js= +github.com/IBM/platform-services-go-sdk v0.90.0 h1:hsUkgZZBGYK+szFb0tF9Q7uy1VjMY+VlYAPgPwFPMrg= +github.com/IBM/platform-services-go-sdk v0.90.0/go.mod h1:aGD045m6I8pfcB77wft8w2cHqWOJjcM3YSSV55BX0Js= github.com/IBM/project-go-sdk v0.3.9 h1:D/UfMMn+vMQyvYf9EfocV6HrD3HcVpeIVoUSjNKuROo= github.com/IBM/project-go-sdk v0.3.9/go.mod h1:FOJM9ihQV3EEAY6YigcWiTNfVCThtdY8bLC/nhQHFvo= github.com/IBM/schematics-go-sdk v0.4.0 h1:x01f/tPquYJYLQzJLGuxWfCbV/EdSMXRikOceNy/JLM= @@ -451,8 +451,8 @@ github.com/stretchr/testify v1.8.4/go.mod h1:sz/lmYIOXD/1dqDmKjjqLyZ2RngseejIcXl github.com/stretchr/testify v1.9.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.19 h1:6a84e97jf33CjHPz6doFNloP3XiAXE2YZ27x/Tq8AFk= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.19/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20 h1:jESkPVhbtjVGnZFEg227spKiA+p0nAA4pslMmA8OhYw= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20/go.mod h1:c1PLKvLVUfjjnzbIJ2Q59/mjOV9SWtYA5p/5k0JvER0= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=