diff --git a/common-dev-assets b/common-dev-assets index a4e4a683..47c0edbc 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit a4e4a683410392c39f62583b1fe64b3861e058d8 +Subproject commit 47c0edbc6d669874511116e4cb645097d10561b9 diff --git a/examples/complete/README.md b/examples/complete/README.md index 825d5ece..cc6e3602 100644 --- a/examples/complete/README.md +++ b/examples/complete/README.md @@ -16,13 +16,13 @@ This examples handles the provisioning of a new Secrets Manager instance. | Name | Source | Version | |------|--------|---------| -| [code\_engine\_build](#module\_code\_engine\_build) | terraform-ibm-modules/code-engine/ibm//modules/build | 4.5.8 | -| [code\_engine\_job](#module\_code\_engine\_job) | terraform-ibm-modules/code-engine/ibm//modules/job | 4.5.8 | -| [code\_engine\_project](#module\_code\_engine\_project) | terraform-ibm-modules/code-engine/ibm//modules/project | 4.5.8 | -| [code\_engine\_secret](#module\_code\_engine\_secret) | terraform-ibm-modules/code-engine/ibm//modules/secret | 4.5.8 | -| [custom\_credential\_engine](#module\_custom\_credential\_engine) | terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm | 1.0.0 | -| [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 2.6.24 | -| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.24 | +| [code\_engine\_build](#module\_code\_engine\_build) | terraform-ibm-modules/code-engine/ibm//modules/build | 4.5.13 | +| [code\_engine\_job](#module\_code\_engine\_job) | terraform-ibm-modules/code-engine/ibm//modules/job | 4.5.13 | +| [code\_engine\_project](#module\_code\_engine\_project) | terraform-ibm-modules/code-engine/ibm//modules/project | 4.5.13 | +| [code\_engine\_secret](#module\_code\_engine\_secret) | terraform-ibm-modules/code-engine/ibm//modules/secret | 4.5.13 | +| [custom\_credential\_engine](#module\_custom\_credential\_engine) | terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm | 1.0.1 | +| [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 2.7.0 | +| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.25 | | [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.3.0 | | [secret\_manager\_custom\_credential](#module\_secret\_manager\_custom\_credential) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.9.0 | | [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a | diff --git a/examples/complete/main.tf b/examples/complete/main.tf index f1b8eac7..9170d017 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -8,7 +8,7 @@ module "resource_group" { module "key_protect" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.24" + version = "5.1.25" key_protect_instance_name = "${var.prefix}-key-protect" resource_group_id = module.resource_group.resource_group_id region = var.region @@ -27,7 +27,7 @@ module "key_protect" { module "event_notification" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "2.6.24" + version = "2.7.0" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags @@ -107,7 +107,7 @@ module "secrets_manager" { ############################################################################## module "code_engine_project" { source = "terraform-ibm-modules/code-engine/ibm//modules/project" - version = "4.5.8" + version = "4.5.13" name = "${var.prefix}-project" resource_group_id = module.resource_group.resource_group_id } @@ -122,7 +122,7 @@ locals { module "code_engine_secret" { source = "terraform-ibm-modules/code-engine/ibm//modules/secret" - version = "4.5.8" + version = "4.5.13" name = "${var.prefix}-rs" project_id = module.code_engine_project.id format = "registry" @@ -148,7 +148,7 @@ resource "ibm_cr_namespace" "rg_namespace" { # For example the region is hardcoded to us-south in order to hardcode the output image and region for creating Code Engine Project and build module "code_engine_build" { source = "terraform-ibm-modules/code-engine/ibm//modules/build" - version = "4.5.8" + version = "4.5.13" name = "${var.prefix}-build" region = var.region ibmcloud_api_key = var.ibmcloud_api_key @@ -179,7 +179,7 @@ locals { module "code_engine_job" { depends_on = [module.code_engine_build] source = "terraform-ibm-modules/code-engine/ibm//modules/job" - version = "4.5.8" + version = "4.5.13" name = "${var.prefix}-job" image_reference = local.output_image image_secret = module.code_engine_secret.name @@ -200,7 +200,7 @@ module "code_engine_job" { module "custom_credential_engine" { depends_on = [module.secrets_manager, module.code_engine_job] source = "terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm" - version = "1.0.0" + version = "1.0.1" secrets_manager_guid = module.secrets_manager.secrets_manager_guid secrets_manager_region = module.secrets_manager.secrets_manager_region custom_credential_engine_name = "${var.prefix}-test-custom-engine" diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 983396e3..c2c0e9fe 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -42,7 +42,7 @@ module "cbr_zone" { module "event_notification" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "2.6.24" + version = "2.7.0" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index e14fdd99..b6fe8179 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -130,7 +130,7 @@ module "kms" { } count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.24" + version = "5.1.25" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index b79f144f..18459d96 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "event_notifications" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "2.6.24" + version = "2.7.0" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags @@ -31,7 +31,7 @@ module "event_notifications" { module "key_protect" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.24" + version = "5.1.25" key_protect_instance_name = "${var.prefix}-key-protect" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/tests/go.mod b/tests/go.mod index 76f4d5d2..28080ecf 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -7,7 +7,7 @@ toolchain go1.25.1 require ( github.com/gruntwork-io/terratest v0.50.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 ) require ( @@ -95,7 +95,7 @@ require ( golang.org/x/crypto v0.41.0 // indirect golang.org/x/mod v0.26.0 // indirect golang.org/x/net v0.42.0 // indirect - golang.org/x/sync v0.16.0 // indirect + golang.org/x/sync v0.17.0 // indirect golang.org/x/sys v0.35.0 // indirect golang.org/x/text v0.28.0 // indirect golang.org/x/tools v0.35.0 // indirect diff --git a/tests/go.sum b/tests/go.sum index 636f2362..8cb99db0 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4 h1:dG1Y+Rc48nGCfI5kgcjVv4S9WV4+aoAAwyXOniMBnpo= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.4/go.mod h1:Of4ASK2oTVTQ8J6RAZ7eHaYL6VOY/aO07cBV7NTMhgY= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6 h1:Tr7AlrQ+s1Nc9VOwB+It8sItnDOXhfXTxKqI2KtdyFA= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6/go.mod h1:YBrRYc+5y5Pr9CXmY35lOqTQdlIjA4x4+3iVObXGOCE= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk= @@ -398,8 +398,8 @@ golang.org/x/sync v0.1.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.2.0/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.3.0/go.mod h1:FU7BRWz2tNW+3quACPkgCx/L+uEAv1htQ0V83Z9Rj+Y= golang.org/x/sync v0.5.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk= -golang.org/x/sync v0.16.0 h1:ycBJEhp9p4vXvUZNszeOq0kGTPghopOL8q0fq3vstxw= -golang.org/x/sync v0.16.0/go.mod h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA= +golang.org/x/sync v0.17.0 h1:l60nONMj9l5drqw6jlhIELNv9I0A4OFgRsG9k2oT9Ug= +golang.org/x/sync v0.17.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI= golang.org/x/sys v0.0.0-20180909124046-d0be0721c37e/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=