Skip to content

Commit 8abc9fb

Browse files
fix(deps): update dependencies
1 parent f0ebcaf commit 8abc9fb

File tree

8 files changed

+25
-25
lines changed

8 files changed

+25
-25
lines changed

common-dev-assets

examples/complete/README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@ This examples handles the provisioning of a new Secrets Manager instance.
1616

1717
| Name | Source | Version |
1818
|------|--------|---------|
19-
| <a name="module_code_engine_build"></a> [code\_engine\_build](#module\_code\_engine\_build) | terraform-ibm-modules/code-engine/ibm//modules/build | 4.5.8 |
20-
| <a name="module_code_engine_job"></a> [code\_engine\_job](#module\_code\_engine\_job) | terraform-ibm-modules/code-engine/ibm//modules/job | 4.5.8 |
21-
| <a name="module_code_engine_project"></a> [code\_engine\_project](#module\_code\_engine\_project) | terraform-ibm-modules/code-engine/ibm//modules/project | 4.5.8 |
22-
| <a name="module_code_engine_secret"></a> [code\_engine\_secret](#module\_code\_engine\_secret) | terraform-ibm-modules/code-engine/ibm//modules/secret | 4.5.8 |
23-
| <a name="module_custom_credential_engine"></a> [custom\_credential\_engine](#module\_custom\_credential\_engine) | terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm | 1.0.0 |
24-
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 2.6.24 |
25-
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.24 |
19+
| <a name="module_code_engine_build"></a> [code\_engine\_build](#module\_code\_engine\_build) | terraform-ibm-modules/code-engine/ibm//modules/build | 4.5.13 |
20+
| <a name="module_code_engine_job"></a> [code\_engine\_job](#module\_code\_engine\_job) | terraform-ibm-modules/code-engine/ibm//modules/job | 4.5.13 |
21+
| <a name="module_code_engine_project"></a> [code\_engine\_project](#module\_code\_engine\_project) | terraform-ibm-modules/code-engine/ibm//modules/project | 4.5.13 |
22+
| <a name="module_code_engine_secret"></a> [code\_engine\_secret](#module\_code\_engine\_secret) | terraform-ibm-modules/code-engine/ibm//modules/secret | 4.5.13 |
23+
| <a name="module_custom_credential_engine"></a> [custom\_credential\_engine](#module\_custom\_credential\_engine) | terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm | 1.0.1 |
24+
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 2.7.0 |
25+
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.25 |
2626
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.3.0 |
2727
| <a name="module_secret_manager_custom_credential"></a> [secret\_manager\_custom\_credential](#module\_secret\_manager\_custom\_credential) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.9.0 |
2828
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |

examples/complete/main.tf

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ module "resource_group" {
88

99
module "key_protect" {
1010
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
11-
version = "5.1.24"
11+
version = "5.1.25"
1212
key_protect_instance_name = "${var.prefix}-key-protect"
1313
resource_group_id = module.resource_group.resource_group_id
1414
region = var.region
@@ -27,7 +27,7 @@ module "key_protect" {
2727

2828
module "event_notification" {
2929
source = "terraform-ibm-modules/event-notifications/ibm"
30-
version = "2.6.24"
30+
version = "2.7.0"
3131
resource_group_id = module.resource_group.resource_group_id
3232
name = "${var.prefix}-en"
3333
tags = var.resource_tags
@@ -107,7 +107,7 @@ module "secrets_manager" {
107107
##############################################################################
108108
module "code_engine_project" {
109109
source = "terraform-ibm-modules/code-engine/ibm//modules/project"
110-
version = "4.5.8"
110+
version = "4.5.13"
111111
name = "${var.prefix}-project"
112112
resource_group_id = module.resource_group.resource_group_id
113113
}
@@ -122,7 +122,7 @@ locals {
122122

123123
module "code_engine_secret" {
124124
source = "terraform-ibm-modules/code-engine/ibm//modules/secret"
125-
version = "4.5.8"
125+
version = "4.5.13"
126126
name = "${var.prefix}-rs"
127127
project_id = module.code_engine_project.id
128128
format = "registry"
@@ -148,7 +148,7 @@ resource "ibm_cr_namespace" "rg_namespace" {
148148
# For example the region is hardcoded to us-south in order to hardcode the output image and region for creating Code Engine Project and build
149149
module "code_engine_build" {
150150
source = "terraform-ibm-modules/code-engine/ibm//modules/build"
151-
version = "4.5.8"
151+
version = "4.5.13"
152152
name = "${var.prefix}-build"
153153
region = var.region
154154
ibmcloud_api_key = var.ibmcloud_api_key
@@ -179,7 +179,7 @@ locals {
179179
module "code_engine_job" {
180180
depends_on = [module.code_engine_build]
181181
source = "terraform-ibm-modules/code-engine/ibm//modules/job"
182-
version = "4.5.8"
182+
version = "4.5.13"
183183
name = "${var.prefix}-job"
184184
image_reference = local.output_image
185185
image_secret = module.code_engine_secret.name
@@ -200,7 +200,7 @@ module "code_engine_job" {
200200
module "custom_credential_engine" {
201201
depends_on = [module.secrets_manager, module.code_engine_job]
202202
source = "terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm"
203-
version = "1.0.0"
203+
version = "1.0.1"
204204
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
205205
secrets_manager_region = module.secrets_manager.secrets_manager_region
206206
custom_credential_engine_name = "${var.prefix}-test-custom-engine"

examples/fscloud/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ module "cbr_zone" {
4242

4343
module "event_notification" {
4444
source = "terraform-ibm-modules/event-notifications/ibm"
45-
version = "2.6.24"
45+
version = "2.7.0"
4646
resource_group_id = module.resource_group.resource_group_id
4747
name = "${var.prefix}-en"
4848
tags = var.resource_tags

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ module "kms" {
130130
}
131131
count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
132132
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
133-
version = "5.1.24"
133+
version = "5.1.25"
134134
create_key_protect_instance = false
135135
region = local.kms_region
136136
existing_kms_instance_crn = var.existing_kms_instance_crn

tests/existing-resources/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "event_notifications" {
1818
source = "terraform-ibm-modules/event-notifications/ibm"
19-
version = "2.6.24"
19+
version = "2.7.0"
2020
resource_group_id = module.resource_group.resource_group_id
2121
name = "${var.prefix}-en"
2222
tags = var.resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
3131

3232
module "key_protect" {
3333
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
34-
version = "5.1.24"
34+
version = "5.1.25"
3535
key_protect_instance_name = "${var.prefix}-key-protect"
3636
resource_group_id = module.resource_group.resource_group_id
3737
region = var.region

tests/go.mod

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ toolchain go1.25.1
77
require (
88
github.com/gruntwork-io/terratest v0.50.0
99
github.com/stretchr/testify v1.11.1
10-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4
10+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6
1111
)
1212

1313
require (
@@ -95,7 +95,7 @@ require (
9595
golang.org/x/crypto v0.41.0 // indirect
9696
golang.org/x/mod v0.26.0 // indirect
9797
golang.org/x/net v0.42.0 // indirect
98-
golang.org/x/sync v0.16.0 // indirect
98+
golang.org/x/sync v0.17.0 // indirect
9999
golang.org/x/sys v0.35.0 // indirect
100100
golang.org/x/text v0.28.0 // indirect
101101
golang.org/x/tools v0.35.0 // indirect

tests/go.sum

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
297297
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
298298
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
299299
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
300-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4 h1:dG1Y+Rc48nGCfI5kgcjVv4S9WV4+aoAAwyXOniMBnpo=
301-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4/go.mod h1:Of4ASK2oTVTQ8J6RAZ7eHaYL6VOY/aO07cBV7NTMhgY=
300+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 h1:Tr7AlrQ+s1Nc9VOwB+It8sItnDOXhfXTxKqI2KtdyFA=
301+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6/go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE=
302302
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
303303
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
304304
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=
@@ -398,8 +398,8 @@ golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
398398
golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
399399
golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y=
400400
golang.org/x/sync v0.5.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
401-
golang.org/x/sync v0.16.0 h1:ycBJEhp9p4vXvUZNszeOq0kGTPghopOL8q0fq3vstxw=
402-
golang.org/x/sync v0.16.0/go.mod h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA=
401+
golang.org/x/sync v0.17.0 h1:l60nONMj9l5drqw6jlhIELNv9I0A4OFgRsG9k2oT9Ug=
402+
golang.org/x/sync v0.17.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
403403
golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
404404
golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
405405
golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=

0 commit comments

Comments
 (0)