Skip to content

Commit 35ab763

Browse files
chore(deps): update ci dependencies
1 parent 28996ce commit 35ab763

File tree

6 files changed

+37
-37
lines changed

6 files changed

+37
-37
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ You need the following permissions to run this module.
9494
| Name | Description | Type | Default | Required |
9595
|------|-------------|------|---------|:--------:|
9696
| <a name="input_allowed_network"></a> [allowed\_network](#input\_allowed\_network) | The types of service endpoints to set on the Secrets Manager instance. Possible values are `private-only` or `public-and-private`. | `string` | `"public-and-private"` | no |
97-
| <a name="input_cbr_rules"></a> [cbr\_rules](#input\_cbr\_rules) | (Optional, list) List of CBR rules to create | <pre>list(object({<br> description = string<br> account_id = string<br> rule_contexts = list(object({<br> attributes = optional(list(object({<br> name = string<br> value = string<br> }))) }))<br> enforcement_mode = string<br> }))</pre> | `[]` | no |
97+
| <a name="input_cbr_rules"></a> [cbr\_rules](#input\_cbr\_rules) | (Optional, list) List of CBR rules to create | <pre>list(object({<br/> description = string<br/> account_id = string<br/> rule_contexts = list(object({<br/> attributes = optional(list(object({<br/> name = string<br/> value = string<br/> }))) }))<br/> enforcement_mode = string<br/> }))</pre> | `[]` | no |
9898
| <a name="input_enable_event_notification"></a> [enable\_event\_notification](#input\_enable\_event\_notification) | Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn` and `existing_sm_instance_crn` must be null. | `bool` | `false` | no |
9999
| <a name="input_endpoint_type"></a> [endpoint\_type](#input\_endpoint\_type) | The type of endpoint (public or private) to connect to the Secrets Manager API. The Terraform provider uses this endpoint type to interact with the Secrets Manager API and configure Event Notifications. | `string` | `"public"` | no |
100100
| <a name="input_existing_en_instance_crn"></a> [existing\_en\_instance\_crn](#input\_existing\_en\_instance\_crn) | The CRN of the Event Notifications service to enable lifecycle notifications for your Secrets Manager instance. | `string` | `null` | no |
@@ -104,7 +104,7 @@ You need the following permissions to run this module.
104104
| <a name="input_kms_key_crn"></a> [kms\_key\_crn](#input\_kms\_key\_crn) | The root key CRN of a Key Management Service like Key Protect or Hyper Protect Crypto Services (HPCS) that you want to use for encryption. Only used if `kms_encryption_enabled` is set to true. | `string` | `null` | no |
105105
| <a name="input_region"></a> [region](#input\_region) | The region where the resource will be provisioned.Its not required if passing a value for `existing_sm_instance_crn`. | `string` | `null` | no |
106106
| <a name="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id) | The ID of the resource group | `string` | n/a | yes |
107-
| <a name="input_secrets"></a> [secrets](#input\_secrets) | Secret Manager secrets configurations. | <pre>list(object({<br> secret_group_name = string<br> secret_group_description = optional(string)<br> existing_secret_group = optional(bool, false)<br> secrets = optional(list(object({<br> secret_name = string<br> secret_description = optional(string)<br> secret_type = optional(string)<br> imported_cert_certificate = optional(string)<br> imported_cert_private_key = optional(string)<br> imported_cert_intermediate = optional(string)<br> secret_username = optional(string)<br> secret_labels = optional(list(string), [])<br> secret_payload_password = optional(string, "")<br> secret_auto_rotation = optional(bool, true)<br> secret_auto_rotation_unit = optional(string, "day")<br> secret_auto_rotation_interval = optional(number, 89)<br> service_credentials_ttl = optional(string, "7776000") # 90 days<br> service_credentials_source_service_crn = optional(string)<br> service_credentials_source_service_role = optional(string)<br> })))<br> }))</pre> | `[]` | no |
107+
| <a name="input_secrets"></a> [secrets](#input\_secrets) | Secret Manager secrets configurations. | <pre>list(object({<br/> secret_group_name = string<br/> secret_group_description = optional(string)<br/> existing_secret_group = optional(bool, false)<br/> secrets = optional(list(object({<br/> secret_name = string<br/> secret_description = optional(string)<br/> secret_type = optional(string)<br/> imported_cert_certificate = optional(string)<br/> imported_cert_private_key = optional(string)<br/> imported_cert_intermediate = optional(string)<br/> secret_username = optional(string)<br/> secret_labels = optional(list(string), [])<br/> secret_payload_password = optional(string, "")<br/> secret_auto_rotation = optional(bool, true)<br/> secret_auto_rotation_unit = optional(string, "day")<br/> secret_auto_rotation_interval = optional(number, 89)<br/> service_credentials_ttl = optional(string, "7776000") # 90 days<br/> service_credentials_source_service_crn = optional(string)<br/> service_credentials_source_service_role = optional(string)<br/> })))<br/> }))</pre> | `[]` | no |
108108
| <a name="input_secrets_manager_name"></a> [secrets\_manager\_name](#input\_secrets\_manager\_name) | The name of the Secrets Manager instance to create | `string` | n/a | yes |
109109
| <a name="input_skip_en_iam_authorization_policy"></a> [skip\_en\_iam\_authorization\_policy](#input\_skip\_en\_iam\_authorization\_policy) | Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances (scoped to the resource group) an 'Event Source Manager' role to the given Event Notifications instance passed in the `existing_en_instance_crn` input variable. In addition, no policy is created if `enable_event_notification` is set to false. | `bool` | `false` | no |
110110
| <a name="input_skip_kms_iam_authorization_policy"></a> [skip\_kms\_iam\_authorization\_policy](#input\_skip\_kms\_iam\_authorization\_policy) | Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the `existing_kms_instance_guid` variable. In addition, no policy is created if `kms_encryption_enabled` is set to false. | `bool` | `false` | no |

modules/fscloud/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,14 +47,14 @@ No resources.
4747

4848
| Name | Description | Type | Default | Required |
4949
|------|-------------|------|---------|:--------:|
50-
| <a name="input_cbr_rules"></a> [cbr\_rules](#input\_cbr\_rules) | (list) List of CBR rules to create | <pre>list(object({<br> description = string<br> account_id = string<br> rule_contexts = list(object({<br> attributes = optional(list(object({<br> name = string<br> value = string<br> }))) }))<br> enforcement_mode = string<br> }))</pre> | `[]` | no |
50+
| <a name="input_cbr_rules"></a> [cbr\_rules](#input\_cbr\_rules) | (list) List of CBR rules to create | <pre>list(object({<br/> description = string<br/> account_id = string<br/> rule_contexts = list(object({<br/> attributes = optional(list(object({<br/> name = string<br/> value = string<br/> }))) }))<br/> enforcement_mode = string<br/> }))</pre> | `[]` | no |
5151
| <a name="input_enable_event_notification"></a> [enable\_event\_notification](#input\_enable\_event\_notification) | Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn` variable. | `bool` | `false` | no |
5252
| <a name="input_existing_en_instance_crn"></a> [existing\_en\_instance\_crn](#input\_existing\_en\_instance\_crn) | The CRN of the Event Notifications service to enable lifecycle notifications for your Secrets Manager instance. | `string` | `null` | no |
5353
| <a name="input_existing_kms_instance_guid"></a> [existing\_kms\_instance\_guid](#input\_existing\_kms\_instance\_guid) | The GUID of the Hyper Protect Crypto Services instance in which the key specified in `kms_key_crn` is coming from. | `string` | n/a | yes |
5454
| <a name="input_kms_key_crn"></a> [kms\_key\_crn](#input\_kms\_key\_crn) | The root key CRN of Hyper Protect Crypto Services (HPCS) that you want to use for encryption. | `string` | n/a | yes |
5555
| <a name="input_region"></a> [region](#input\_region) | The region to provision the Secrets Manager instance to. | `string` | n/a | yes |
5656
| <a name="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id) | The ID of the resource group to provision the Secrets Manager instance to. | `string` | n/a | yes |
57-
| <a name="input_secrets"></a> [secrets](#input\_secrets) | Secret Manager secrets configurations. | <pre>list(object({<br> secret_group_name = string<br> secret_group_description = optional(string)<br> existing_secret_group = optional(bool, false)<br> secrets = optional(list(object({<br> secret_name = string<br> secret_description = optional(string)<br> secret_type = optional(string)<br> imported_cert_certificate = optional(string)<br> imported_cert_private_key = optional(string)<br> imported_cert_intermediate = optional(string)<br> secret_username = optional(string)<br> secret_labels = optional(list(string), [])<br> secret_payload_password = optional(string, "")<br> secret_auto_rotation = optional(bool, true)<br> secret_auto_rotation_unit = optional(string, "day")<br> secret_auto_rotation_interval = optional(number, 89)<br> service_credentials_ttl = optional(string, "7776000") # 90 days<br> service_credentials_source_service_crn = optional(string)<br> service_credentials_source_service_role = optional(string)<br> })))<br> }))</pre> | `[]` | no |
57+
| <a name="input_secrets"></a> [secrets](#input\_secrets) | Secret Manager secrets configurations. | <pre>list(object({<br/> secret_group_name = string<br/> secret_group_description = optional(string)<br/> existing_secret_group = optional(bool, false)<br/> secrets = optional(list(object({<br/> secret_name = string<br/> secret_description = optional(string)<br/> secret_type = optional(string)<br/> imported_cert_certificate = optional(string)<br/> imported_cert_private_key = optional(string)<br/> imported_cert_intermediate = optional(string)<br/> secret_username = optional(string)<br/> secret_labels = optional(list(string), [])<br/> secret_payload_password = optional(string, "")<br/> secret_auto_rotation = optional(bool, true)<br/> secret_auto_rotation_unit = optional(string, "day")<br/> secret_auto_rotation_interval = optional(number, 89)<br/> service_credentials_ttl = optional(string, "7776000") # 90 days<br/> service_credentials_source_service_crn = optional(string)<br/> service_credentials_source_service_role = optional(string)<br/> })))<br/> }))</pre> | `[]` | no |
5858
| <a name="input_secrets_manager_name"></a> [secrets\_manager\_name](#input\_secrets\_manager\_name) | The name to give the Secrets Manager instance. | `string` | n/a | yes |
5959
| <a name="input_service_plan"></a> [service\_plan](#input\_service\_plan) | The Secrets Manager plan to provision. | `string` | `"standard"` | no |
6060
| <a name="input_skip_en_iam_authorization_policy"></a> [skip\_en\_iam\_authorization\_policy](#input\_skip\_en\_iam\_authorization\_policy) | Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances (scoped to the resource group) an 'Event Source Manager' role to the given Event Notifications instance passed in the `existing_en_instance_crn` input variable. In addition, no policy is created if `enable_event_notification` is set to false. | `bool` | `false` | no |

modules/secrets/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ module "secrets_manager" {
6666
| <a name="input_endpoint_type"></a> [endpoint\_type](#input\_endpoint\_type) | The service endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private` | `string` | `"public"` | no |
6767
| <a name="input_existing_sm_instance_guid"></a> [existing\_sm\_instance\_guid](#input\_existing\_sm\_instance\_guid) | Instance ID of Secrets Manager instance in which the Secret will be added. | `string` | n/a | yes |
6868
| <a name="input_existing_sm_instance_region"></a> [existing\_sm\_instance\_region](#input\_existing\_sm\_instance\_region) | Region which the Secret Manager is deployed. | `string` | n/a | yes |
69-
| <a name="input_secrets"></a> [secrets](#input\_secrets) | Secret Manager secrets configurations. | <pre>list(object({<br> secret_group_name = string<br> secret_group_description = optional(string)<br> existing_secret_group = optional(bool, false)<br> secrets = optional(list(object({<br> secret_name = string<br> secret_description = optional(string)<br> secret_type = optional(string)<br> imported_cert_certificate = optional(string)<br> imported_cert_private_key = optional(string)<br> imported_cert_intermediate = optional(string)<br> secret_username = optional(string)<br> secret_labels = optional(list(string), [])<br> secret_payload_password = optional(string, "")<br> secret_auto_rotation = optional(bool, true)<br> secret_auto_rotation_unit = optional(string, "day")<br> secret_auto_rotation_interval = optional(number, 89)<br> service_credentials_ttl = optional(string, "7776000") # 90 days<br> service_credentials_source_service_crn = optional(string)<br> service_credentials_source_service_role = optional(string)<br> })))<br> }))</pre> | `[]` | no |
69+
| <a name="input_secrets"></a> [secrets](#input\_secrets) | Secret Manager secrets configurations. | <pre>list(object({<br/> secret_group_name = string<br/> secret_group_description = optional(string)<br/> existing_secret_group = optional(bool, false)<br/> secrets = optional(list(object({<br/> secret_name = string<br/> secret_description = optional(string)<br/> secret_type = optional(string)<br/> imported_cert_certificate = optional(string)<br/> imported_cert_private_key = optional(string)<br/> imported_cert_intermediate = optional(string)<br/> secret_username = optional(string)<br/> secret_labels = optional(list(string), [])<br/> secret_payload_password = optional(string, "")<br/> secret_auto_rotation = optional(bool, true)<br/> secret_auto_rotation_unit = optional(string, "day")<br/> secret_auto_rotation_interval = optional(number, 89)<br/> service_credentials_ttl = optional(string, "7776000") # 90 days<br/> service_credentials_source_service_crn = optional(string)<br/> service_credentials_source_service_role = optional(string)<br/> })))<br/> }))</pre> | `[]` | no |
7070

7171
### Outputs
7272

tests/go.mod

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
module github.com/terraform-ibm-modules/terraform-ibm-secrets-manager
22

3-
go 1.22
3+
go 1.22.0
44

5-
toolchain go1.23.1
5+
toolchain go1.23.2
66

77
require (
88
github.com/IBM/go-sdk-core/v5 v5.17.5
9-
github.com/IBM/secrets-manager-go-sdk/v2 v2.0.5
10-
github.com/gruntwork-io/terratest v0.47.1
9+
github.com/IBM/secrets-manager-go-sdk/v2 v2.0.8
10+
github.com/gruntwork-io/terratest v0.47.2
1111
github.com/stretchr/testify v1.9.0
12-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.38.2
12+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.40.4
1313
)
1414

1515
require (
@@ -20,10 +20,10 @@ require (
2020
cloud.google.com/go/storage v1.30.1 // indirect
2121
dario.cat/mergo v1.0.0 // indirect
2222
github.com/IBM-Cloud/bluemix-go v0.0.0-20240719075425-078fcb3a55be // indirect
23-
github.com/IBM-Cloud/power-go-client v1.7.1 // indirect
23+
github.com/IBM-Cloud/power-go-client v1.8.1 // indirect
2424
github.com/IBM/cloud-databases-go-sdk v0.7.0 // indirect
25-
github.com/IBM/platform-services-go-sdk v0.69.0 // indirect
26-
github.com/IBM/project-go-sdk v0.3.0 // indirect
25+
github.com/IBM/platform-services-go-sdk v0.69.2 // indirect
26+
github.com/IBM/project-go-sdk v0.3.6 // indirect
2727
github.com/IBM/schematics-go-sdk v0.3.0 // indirect
2828
github.com/IBM/vpc-go-sdk v1.0.2 // indirect
2929
github.com/Microsoft/go-winio v0.6.1 // indirect
@@ -102,13 +102,13 @@ require (
102102
go.opentelemetry.io/otel v1.16.0 // indirect
103103
go.opentelemetry.io/otel/metric v1.16.0 // indirect
104104
go.opentelemetry.io/otel/trace v1.16.0 // indirect
105-
golang.org/x/crypto v0.27.0 // indirect
105+
golang.org/x/crypto v0.28.0 // indirect
106106
golang.org/x/mod v0.17.0 // indirect
107107
golang.org/x/net v0.25.0 // indirect
108108
golang.org/x/oauth2 v0.10.0 // indirect
109109
golang.org/x/sync v0.8.0 // indirect
110-
golang.org/x/sys v0.25.0 // indirect
111-
golang.org/x/text v0.18.0 // indirect
110+
golang.org/x/sys v0.26.0 // indirect
111+
golang.org/x/text v0.19.0 // indirect
112112
golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d // indirect
113113
golang.org/x/xerrors v0.0.0-20220907171357-04be3eba64a2 // indirect
114114
google.golang.org/api v0.127.0 // indirect

0 commit comments

Comments
 (0)