diff --git a/README.md b/README.md index a02ab3cf1..beae5ae42 100644 --- a/README.md +++ b/README.md @@ -851,17 +851,17 @@ module "cluster_pattern" { | Name | Source | Version | |------|--------|---------| -| [bastion\_host](#module\_bastion\_host) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.5.4 | -| [cluster](#module\_cluster) | terraform-ibm-modules/base-ocp-vpc/ibm | 3.56.0 | +| [bastion\_host](#module\_bastion\_host) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.6.1 | +| [cluster](#module\_cluster) | terraform-ibm-modules/base-ocp-vpc/ibm | 3.59.0 | | [dynamic\_values](#module\_dynamic\_values) | ./dynamic_values | n/a | -| [f5\_vsi](#module\_f5\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.5.4 | +| [f5\_vsi](#module\_f5\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.6.1 | | [key\_management](#module\_key\_management) | ./kms | n/a | | [placement\_group\_map](#module\_placement\_group\_map) | ./dynamic_values/config_modules/list_to_map | n/a | | [ssh\_keys](#module\_ssh\_keys) | ./ssh_key | n/a | | [teleport\_config](#module\_teleport\_config) | ./teleport_config | n/a | | [update\_cbr\_vpc\_zone](#module\_update\_cbr\_vpc\_zone) | terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module | 1.33.2 | -| [vpc](#module\_vpc) | terraform-ibm-modules/landing-zone-vpc/ibm | 8.2.2 | -| [vsi](#module\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.5.4 | +| [vpc](#module\_vpc) | terraform-ibm-modules/landing-zone-vpc/ibm | 8.3.0 | +| [vsi](#module\_vsi) | terraform-ibm-modules/landing-zone-vsi/ibm | 5.6.1 | ### Resources diff --git a/bastion_host.tf b/bastion_host.tf index 3356acf75..9a39ab052 100644 --- a/bastion_host.tf +++ b/bastion_host.tf @@ -42,7 +42,7 @@ module "teleport_config" { module "bastion_host" { source = "terraform-ibm-modules/landing-zone-vsi/ibm" - version = "5.5.4" + version = "5.6.1" for_each = local.bastion_vsi_map resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group] create_security_group = each.value.security_group == null ? false : true diff --git a/cluster.tf b/cluster.tf index e49a717cc..eda0bd0e5 100644 --- a/cluster.tf +++ b/cluster.tf @@ -244,7 +244,7 @@ module "cluster" { if cluster.kube_type == "openshift" } source = "terraform-ibm-modules/base-ocp-vpc/ibm" - version = "3.56.0" + version = "3.59.0" resource_group_id = local.resource_groups[each.value.resource_group] region = var.region cluster_name = each.value.cluster_name diff --git a/common-dev-assets b/common-dev-assets index 47c0edbc6..325cfd0d9 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit 47c0edbc6d669874511116e4cb645097d10561b9 +Subproject commit 325cfd0d91902e08079644092bbf298c4872f388 diff --git a/f5_vsi.tf b/f5_vsi.tf index 8098b3206..95550f250 100644 --- a/f5_vsi.tf +++ b/f5_vsi.tf @@ -117,7 +117,7 @@ locals { module "f5_vsi" { source = "terraform-ibm-modules/landing-zone-vsi/ibm" - version = "5.5.4" + version = "5.6.1" for_each = local.f5_vsi_map resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group] create_security_group = each.value.security_group == null ? false : true diff --git a/main.tf b/main.tf index 5157bce05..f7b274625 100644 --- a/main.tf +++ b/main.tf @@ -33,7 +33,7 @@ locals { # Due to existing implicit dependencies we do not think this will be an issue, including auth policies for activity tracker. module "vpc" { source = "terraform-ibm-modules/landing-zone-vpc/ibm" - version = "8.2.2" + version = "8.3.0" for_each = local.vpc_map name = each.value.prefix existing_vpc_id = each.value.existing_vpc_id diff --git a/patterns/vsi-extension/main.tf b/patterns/vsi-extension/main.tf index 3ee6d02ec..8c9d907e2 100644 --- a/patterns/vsi-extension/main.tf +++ b/patterns/vsi-extension/main.tf @@ -44,7 +44,7 @@ locals { module "vsi" { source = "terraform-ibm-modules/landing-zone-vsi/ibm" - version = "5.5.4" + version = "5.6.1" resource_group_id = data.ibm_is_vpc.vpc_by_id.resource_group create_security_group = true prefix = "${var.prefix}-vsi" diff --git a/tests/go.mod b/tests/go.mod index 5ae696333..efc362f4f 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -7,7 +7,7 @@ toolchain go1.25.1 require ( github.com/gruntwork-io/terratest v0.50.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.5 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 ) require ( diff --git a/tests/go.sum b/tests/go.sum index 5a27199d6..61214f3c5 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -279,8 +279,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.5 h1:cFfi7TX7WY67sWdgIvOygAb5U1gwXMXNwhhjS61Ysxw= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.5/go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 h1:Tr7AlrQ+s1Nc9VOwB+It8sItnDOXhfXTxKqI2KtdyFA= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6/go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk= diff --git a/virtual_servers.tf b/virtual_servers.tf index db2d3ad31..64ff7c162 100644 --- a/virtual_servers.tf +++ b/virtual_servers.tf @@ -41,7 +41,7 @@ data "ibm_is_image" "image" { module "vsi" { source = "terraform-ibm-modules/landing-zone-vsi/ibm" - version = "5.5.4" + version = "5.6.1" for_each = local.vsi_map resource_group_id = each.value.resource_group == null ? null : local.resource_groups[each.value.resource_group] create_security_group = each.value.security_group == null ? false : true