Skip to content

Commit 4774edd

Browse files
shemauocofaigh
andauthored
fix(deps): update required IBM provider version to >= 1.70.0, < 2.0.0 (#159)
Co-authored-by: Conall Ó Cofaigh <[email protected]>
1 parent 1a70c78 commit 4774edd

File tree

6 files changed

+40
-9
lines changed

6 files changed

+40
-9
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ You need the following permissions to run this module.
163163
| Name | Version |
164164
|------|---------|
165165
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3.0 |
166-
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.54.0, < 2.0.0 |
166+
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.70.0, < 2.0.0 |
167167
| <a name="requirement_time"></a> [time](#requirement\_time) | >= 0.9.1, < 1.0.0 |
168168

169169
### Modules

examples/api_key_auth/main.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ module "secrets_manager" {
1919
secrets_manager_name = "${var.prefix}-secrets-manager" #tfsec:ignore:general-secrets-no-plaintext-exposure
2020
sm_service_plan = "trial"
2121
sm_tags = var.resource_tags
22+
allowed_network = "private-only"
23+
endpoint_type = "private"
2224
}
2325

2426
# Best practise, use the secrets manager secret group module to create a secret group
@@ -29,6 +31,7 @@ module "secrets_manager_secret_group" {
2931
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
3032
secret_group_name = "${var.prefix}-certificates-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
3133
secret_group_description = "secret group used for public certificates" #tfsec:ignore:general-secrets-no-plaintext-exposure
34+
endpoint_type = "private"
3235
}
3336

3437
locals {
@@ -52,6 +55,7 @@ module "public_secret_engine" {
5255
private_key_secrets_manager_instance_guid = var.private_key_secrets_manager_instance_guid
5356
private_key_secrets_manager_secret_id = var.private_key_secrets_manager_secret_id
5457
private_key_secrets_manager_region = var.private_key_secrets_manager_region
58+
service_endpoints = "private"
5559
}
5660

5761
# TODO: Uncomment the following block once the certificate module is published
@@ -72,4 +76,6 @@ module "secrets_manager_public_certificate" {
7276

7377
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
7478
secrets_manager_region = var.region
79+
80+
service_endpoints = "private"
7581
}

examples/api_key_auth/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
# Pin to the lowest provider version of the range defined in the main module to ensure lowest version still works
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = ">= 1.54.0"
7+
version = ">= 1.70.0"
88
}
99
}
1010
}

examples/iam_auth/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
# Pin to the lowest provider version of the range defined in the main module to ensure lowest version still works
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = ">= 1.54.0"
7+
version = ">= 1.70.0"
88
}
99
}
1010
}

tests/pr_test.go

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ import (
99
"github.com/stretchr/testify/assert"
1010
"github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper/common"
1111
"github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper/testhelper"
12+
"github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper/testschematic"
1213
)
1314

1415
// Define a struct with fields that match the structure of the YAML data
@@ -21,6 +22,7 @@ const resourceGroup = "geretain-test-sm-pub-cert-eng"
2122

2223
const keyExampleTerraformDir = "examples/api_key_auth"
2324
const IAMExampleTerraformDir = "examples/iam_auth"
25+
const bestRegionYAMLPath = "../common-dev-assets/common-go-assets/cloudinfo-region-secmgr-prefs.yaml"
2426

2527
// TestMain will be run before any parallel tests, used to read data from yaml for use with tests
2628
func TestMain(m *testing.M) {
@@ -45,20 +47,43 @@ func setupOptions(t *testing.T, prefix string, dir string) *testhelper.TestOptio
4547
"private_key_secrets_manager_secret_id": permanentResources["acme_letsencrypt_private_key_secret_id"],
4648
"private_key_secrets_manager_region": permanentResources["acme_letsencrypt_private_key_sm_region"],
4749
},
48-
BestRegionYAMLPath: "../common-dev-assets/common-go-assets/cloudinfo-region-secmgr-prefs.yaml",
50+
BestRegionYAMLPath: bestRegionYAMLPath,
4951
})
5052

5153
return options
5254
}
5355

54-
func TestRunAPIKeyExample(t *testing.T) {
56+
func TestPrivateInSchematics(t *testing.T) {
5557
t.Parallel()
5658

57-
options := setupOptions(t, "sm-public-cert-eng", keyExampleTerraformDir)
59+
options := testschematic.TestSchematicOptionsDefault(&testschematic.TestSchematicOptions{
60+
Testing: t,
61+
Prefix: "sm-pub-crt-eng-prv",
62+
TarIncludePatterns: []string{
63+
"*.tf",
64+
keyExampleTerraformDir + "/*.tf",
65+
},
66+
ResourceGroup: resourceGroup,
67+
TemplateFolder: keyExampleTerraformDir,
68+
Tags: []string{"test-schematic"},
69+
DeleteWorkspaceOnFail: false,
70+
WaitJobCompleteMinutes: 80,
71+
BestRegionYAMLPath: bestRegionYAMLPath,
72+
})
5873

59-
output, err := options.RunTestConsistency()
74+
options.TerraformVars = []testschematic.TestSchematicTerraformVar{
75+
{Name: "ibmcloud_api_key", Value: options.RequiredEnvironmentVars["TF_VAR_ibmcloud_api_key"], DataType: "string", Secure: true},
76+
{Name: "resource_tags", Value: options.Tags, DataType: "list(string)"},
77+
{Name: "region", Value: options.Region, DataType: "string"},
78+
{Name: "prefix", Value: options.Prefix, DataType: "string"},
79+
{Name: "cis_id", Value: permanentResources["cisInstanceId"], DataType: "string"},
80+
{Name: "private_key_secrets_manager_instance_guid", Value: permanentResources["acme_letsencrypt_private_key_sm_id"], DataType: "string"},
81+
{Name: "private_key_secrets_manager_secret_id", Value: permanentResources["acme_letsencrypt_private_key_secret_id"], DataType: "string"},
82+
{Name: "private_key_secrets_manager_region", Value: permanentResources["acme_letsencrypt_private_key_sm_region"], DataType: "string"},
83+
}
84+
85+
err := options.RunSchematicTest()
6086
assert.Nil(t, err, "This should not have errored")
61-
assert.NotNil(t, output, "Expected some output")
6287
}
6388

6489
func TestRunIAMExample(t *testing.T) {

version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
# Use "greater than or equal to" range in modules
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = ">= 1.54.0, < 2.0.0"
7+
version = ">= 1.70.0, < 2.0.0"
88
configuration_aliases = [ibm, ibm.secret-store]
99
}
1010
time = {

0 commit comments

Comments
 (0)