From 1956af47418c3e2a2df9ec60a29f11b14c2dd57f Mon Sep 17 00:00:00 2001 From: Terraform IBM Modules Operations Date: Sat, 8 Nov 2025 06:09:59 +0000 Subject: [PATCH] fix(deps): update dependencies --- README.md | 14 +++++++------- common-dev-assets | 2 +- examples/complete/main.tf | 6 +++--- examples/fscloud/main.tf | 2 +- main.tf | 6 +++--- solutions/fully-configurable/main.tf | 16 ++++++++-------- tests/go.mod | 8 ++++---- tests/go.sum | 12 ++++++------ 8 files changed, 33 insertions(+), 33 deletions(-) diff --git a/README.md b/README.md index 65640c63..939040f6 100644 --- a/README.md +++ b/README.md @@ -13,10 +13,10 @@ * [Submodules](./modules) * [fscloud](./modules/fscloud) * [Examples](./examples) - * [Basic example with index creation and updates to cluster-wide settings](./examples/basic) - * [Complete example with autoscaling, BYOK encryption and service credentials creation](./examples/complete) - * [Financial Services Cloud profile example with autoscaling enabled](./examples/fscloud) - * [Restore from backup example](./examples/backup-restore) + *
Restore from backup example
Deploy to IBM Cloud button
+ *
Basic example with index creation and updates to cluster-wide settings
Deploy to IBM Cloud button
+ *
Complete example with autoscaling, BYOK encryption and service credentials creation
Deploy to IBM Cloud button
+ *
Financial Services Cloud profile example with autoscaling enabled
Deploy to IBM Cloud button
* [Contributing](#contributing) @@ -68,9 +68,9 @@ You need the following permissions to run this module. | Name | Source | Version | |------|--------|---------| -| [backup\_key\_crn\_parser](#module\_backup\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 | -| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.7 | -| [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 | +| [backup\_key\_crn\_parser](#module\_backup\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.0 | +| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.8 | +| [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.0 | ### Resources diff --git a/common-dev-assets b/common-dev-assets index c4328778..fc1a2725 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit c4328778ce1a62bc85f641d9249adaac0493cfc9 +Subproject commit fc1a27254f57a7815ba98c523fc1ef0c73df6790 diff --git a/examples/complete/main.tf b/examples/complete/main.tf index d3d0f864..2407acfa 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -36,7 +36,7 @@ locals { module "key_protect_all_inclusive" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.4.5" + version = "5.4.9" resource_group_id = module.resource_group.resource_group_id # Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details. # Note: Database instance and Key Protect must be created on the same region. @@ -98,7 +98,7 @@ module "icd_elasticsearch" { module "secrets_manager" { count = var.existing_sm_instance_guid == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm" - version = "2.11.3" + version = "2.11.7" resource_group_id = module.resource_group.resource_group_id region = var.region secrets_manager_name = "${var.prefix}-secrets-manager" @@ -110,7 +110,7 @@ module "secrets_manager" { # Add a Secrets Group to the secret manager instance module "secrets_manager_secrets_group" { source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = local.secrets_manager_region secrets_manager_guid = local.secrets_manager_guid #tfsec:ignore:general-secrets-no-plaintext-exposure diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 5a6d3378..ccf04bd1 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" { ############################################################################## module "cbr_zone" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.33.7" + version = "1.33.8" name = "${var.prefix}-VPC-network-zone" zone_description = "CBR Network zone containing VPC" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id diff --git a/main.tf b/main.tf index 9e592ae0..d0bbe0f3 100644 --- a/main.tf +++ b/main.tf @@ -28,14 +28,14 @@ locals { module "kms_key_crn_parser" { count = local.parse_kms_key ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.kms_key_crn } module "backup_key_crn_parser" { count = local.parse_backup_kms_key ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = local.backup_encryption_key_crn } @@ -303,7 +303,7 @@ resource "ibm_resource_tag" "elasticsearch_tag" { module "cbr_rule" { count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0 source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.33.7" + version = "1.33.8" rule_description = var.cbr_rules[count.index].description enforcement_mode = var.cbr_rules[count.index].enforcement_mode rule_contexts = var.cbr_rules[count.index].rule_contexts diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index b78f7bd9..83211c3a 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -32,7 +32,7 @@ module "kms" { } count = local.create_new_kms_key ? 1 : 0 source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.4.5" + version = "5.4.9" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn @@ -62,21 +62,21 @@ module "kms" { module "kms_instance_crn_parser" { count = var.existing_kms_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.existing_kms_instance_crn } module "kms_key_crn_parser" { count = var.existing_kms_key_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.existing_kms_key_crn } module "kms_backup_key_crn_parser" { count = var.existing_backup_kms_key_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.existing_backup_kms_key_crn } @@ -239,7 +239,7 @@ locals { module "es_instance_crn_parser" { count = var.existing_elasticsearch_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.existing_elasticsearch_instance_crn } @@ -347,7 +347,7 @@ locals { module "sm_instance_crn_parser" { count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.existing_secrets_manager_instance_crn } @@ -432,7 +432,7 @@ locals { module "secrets_manager_service_credentials" { count = length(local.service_credential_secrets) > 0 ? 1 : 0 source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets" - version = "2.11.3" + version = "2.11.7" # converted into implicit dependency and removed explicit depends_on time_sleep.wait_for_elasticsearch_authorization_policy for this module because of issue https://github.com/terraform-ibm-modules/terraform-ibm-icd-redis/issues/608 existing_sm_instance_guid = local.create_secrets_manager_auth_policy > 0 ? time_sleep.wait_for_elasticsearch_authorization_policy[0].triggers["secrets_manager_guid"] : local.existing_secrets_manager_instance_guid existing_sm_instance_region = local.create_secrets_manager_auth_policy > 0 ? time_sleep.wait_for_elasticsearch_authorization_policy[0].triggers["secrets_manager_region"] : local.existing_secrets_manager_instance_region @@ -478,7 +478,7 @@ data "http" "es_metadata" { module "code_engine_kibana" { count = var.enable_kibana_dashboard ? 1 : 0 source = "terraform-ibm-modules/code-engine/ibm" - version = "4.6.9" + version = "4.6.10" resource_group_id = module.resource_group.resource_group_id project_name = local.code_engine_project_name existing_project_id = local.code_engine_project_id diff --git a/tests/go.mod b/tests/go.mod index b2562a04..24ac0b9c 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -2,13 +2,13 @@ module github.com/terraform-ibm-modules/terraform-ibm-icd-elasticsearch go 1.24.0 -toolchain go1.25.3 +toolchain go1.25.4 require ( github.com/google/uuid v1.6.0 - github.com/gruntwork-io/terratest v0.51.0 + github.com/gruntwork-io/terratest v0.52.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20 ) require ( @@ -17,7 +17,7 @@ require ( github.com/IBM-Cloud/power-go-client v1.13.0 // indirect github.com/IBM/cloud-databases-go-sdk v0.8.1 // indirect github.com/IBM/go-sdk-core/v5 v5.21.0 // indirect - github.com/IBM/platform-services-go-sdk v0.89.0 // indirect + github.com/IBM/platform-services-go-sdk v0.90.0 // indirect github.com/IBM/project-go-sdk v0.3.9 // indirect github.com/IBM/schematics-go-sdk v0.4.0 // indirect github.com/IBM/vpc-go-sdk v1.0.2 // indirect diff --git a/tests/go.sum b/tests/go.sum index ef50ed98..a42da5d0 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -9,8 +9,8 @@ github.com/IBM/cloud-databases-go-sdk v0.8.1/go.mod h1:JYucI1PdwqbAd8XGdDAchxzxR github.com/IBM/go-sdk-core/v5 v5.9.2/go.mod h1:YlOwV9LeuclmT/qi/LAK2AsobbAP42veV0j68/rlZsE= github.com/IBM/go-sdk-core/v5 v5.21.0 h1:DUnYhvC4SoC8T84rx5omnhY3+xcQg/Whyoa3mDPIMkk= github.com/IBM/go-sdk-core/v5 v5.21.0/go.mod h1:Q3BYO6iDA2zweQPDGbNTtqft5tDcEpm6RTuqMlPcvbw= -github.com/IBM/platform-services-go-sdk v0.89.0 h1:fIvKR1bQchPoMUXQf69gaRKak/giVAkRDISiAX8TlE8= -github.com/IBM/platform-services-go-sdk v0.89.0/go.mod h1:aGD045m6I8pfcB77wft8w2cHqWOJjcM3YSSV55BX0Js= +github.com/IBM/platform-services-go-sdk v0.90.0 h1:hsUkgZZBGYK+szFb0tF9Q7uy1VjMY+VlYAPgPwFPMrg= +github.com/IBM/platform-services-go-sdk v0.90.0/go.mod h1:aGD045m6I8pfcB77wft8w2cHqWOJjcM3YSSV55BX0Js= github.com/IBM/project-go-sdk v0.3.9 h1:D/UfMMn+vMQyvYf9EfocV6HrD3HcVpeIVoUSjNKuROo= github.com/IBM/project-go-sdk v0.3.9/go.mod h1:FOJM9ihQV3EEAY6YigcWiTNfVCThtdY8bLC/nhQHFvo= github.com/IBM/schematics-go-sdk v0.4.0 h1:x01f/tPquYJYLQzJLGuxWfCbV/EdSMXRikOceNy/JLM= @@ -130,8 +130,8 @@ github.com/google/go-cmp v0.7.0/go.mod h1:pXiqmnSA92OHEEa9HXL2W4E7lf9JzCmGVUdgjX github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0= github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= -github.com/gruntwork-io/terratest v0.51.0 h1:RCXlCwWlHqhUoxgF6n3hvywvbvrsTXqoqt34BrnLekw= -github.com/gruntwork-io/terratest v0.51.0/go.mod h1:evZHXb8VWDgv5O5zEEwfkwMhkx9I53QR/RB11cISrpg= +github.com/gruntwork-io/terratest v0.52.0 h1:7+I3FqEImowIajZ9Qyo5ngr7n2AUINJko6x+KzlWNjU= +github.com/gruntwork-io/terratest v0.52.0/go.mod h1:y2Evi+Ac04QpzF3mbRPqrBjipDN7gjqlw6+OZoy2vX4= github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4= github.com/hashicorp/errwrap v1.1.0 h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY2I= github.com/hashicorp/errwrap v1.1.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4= @@ -235,8 +235,8 @@ github.com/stretchr/testify v1.6.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17 h1:unGRxvM9OJBTsfDQg/AZCYOeJZ5TqrCsPphjWJ2wI94= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20 h1:jESkPVhbtjVGnZFEg227spKiA+p0nAA4pslMmA8OhYw= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20/go.mod h1:c1PLKvLVUfjjnzbIJ2Q59/mjOV9SWtYA5p/5k0JvER0= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.7 h1:RYKTs4kd/gzRsEiv7J3M2WQ7TYRYZVc+0H0pZdERkxA= github.com/tmccombs/hcl2json v0.6.7/go.mod h1:lJgBOOGDpbhjvdG2dLaWsqB4KBzul2HytfDTS3H465o=