From 2027e0953725a0bfecdac96b8b887ff5c6025a9e Mon Sep 17 00:00:00 2001 From: Terraform IBM Modules Operations Date: Sat, 25 Oct 2025 16:38:27 +0000 Subject: [PATCH] fix(deps): update dependencies --- README.md | 2 +- common-dev-assets | 2 +- examples/advanced/main.tf | 18 +++++++++--------- examples/basic/main.tf | 2 +- examples/fscloud/main.tf | 6 +++--- main.tf | 2 +- modules/secrets/README.md | 2 +- modules/secrets/main.tf | 2 +- solutions/fully-configurable/main.tf | 4 ++-- solutions/fully-configurable/version.tf | 2 +- tests/existing-resources/main.tf | 6 +++--- tests/go.mod | 4 ++-- tests/go.sum | 4 ++-- tests/new-rg/main.tf | 2 +- 14 files changed, 29 insertions(+), 29 deletions(-) diff --git a/README.md b/README.md index cf41f9bf..d2aee64c 100644 --- a/README.md +++ b/README.md @@ -72,7 +72,7 @@ You need the following permissions to run this module. | Name | Source | Version | |------|--------|---------| -| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.4 | +| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.7 | | [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 | | [secrets](#module\_secrets) | ./modules/secrets | n/a | diff --git a/common-dev-assets b/common-dev-assets index 1df43f2d..ae23e021 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit 1df43f2daf97a529d05350408d32a12f50d89fbf +Subproject commit ae23e021950779a9c0612e71ce51d074f14b7543 diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf index bb1363ef..bb077321 100644 --- a/examples/advanced/main.tf +++ b/examples/advanced/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -16,7 +16,7 @@ module "resource_group" { module "key_protect" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.3.4" + version = "5.4.5" key_protect_instance_name = "${var.prefix}-key-protect" resource_group_id = module.resource_group.resource_group_id region = var.region @@ -39,7 +39,7 @@ module "key_protect" { module "event_notifications" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "2.9.3" + version = "2.10.5" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags @@ -124,7 +124,7 @@ module "secrets_manager" { # Create new code engine project module "code_engine_project" { source = "terraform-ibm-modules/code-engine/ibm//modules/project" - version = "4.6.3" + version = "4.6.9" name = "${var.prefix}-project" resource_group_id = module.resource_group.resource_group_id } @@ -137,7 +137,7 @@ locals { module "code_engine_secret" { source = "terraform-ibm-modules/code-engine/ibm//modules/secret" - version = "4.6.3" + version = "4.6.9" name = "${var.prefix}-rs" project_id = module.code_engine_project.id format = "registry" @@ -157,7 +157,7 @@ resource "ibm_cr_namespace" "rg_namespace" { # Build example Go application in Code Engine project which dynamically generates User IBM Cloud IAM API Keys module "code_engine_build" { source = "terraform-ibm-modules/code-engine/ibm//modules/build" - version = "4.6.3" + version = "4.6.9" name = "${var.prefix}-build" region = var.region ibmcloud_api_key = var.ibmcloud_api_key @@ -186,7 +186,7 @@ locals { module "code_engine_job" { depends_on = [module.code_engine_build] source = "terraform-ibm-modules/code-engine/ibm//modules/job" - version = "4.6.3" + version = "4.6.9" name = "${var.prefix}-job" image_reference = local.output_image image_secret = module.code_engine_secret.name @@ -207,7 +207,7 @@ module "code_engine_job" { module "custom_credential_engine" { depends_on = [module.secrets_manager, module.code_engine_job] source = "terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm" - version = "1.0.4" + version = "1.0.6" secrets_manager_guid = module.secrets_manager.secrets_manager_guid secrets_manager_region = module.secrets_manager.secrets_manager_region custom_credential_engine_name = "${var.prefix}-test-custom-engine" @@ -229,7 +229,7 @@ module "custom_credential_engine" { module "secret_manager_custom_credential" { depends_on = [module.secrets_manager, module.custom_credential_engine] source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" secret_type = "custom_credentials" #checkov:skip=CKV_SECRET_6 region = module.secrets_manager.secrets_manager_region secrets_manager_guid = module.secrets_manager.secrets_manager_guid diff --git a/examples/basic/main.tf b/examples/basic/main.tf index fceea38d..e4d13d7c 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -1,6 +1,6 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 55951ba0..23c0986e 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -20,7 +20,7 @@ data "ibm_iam_account_settings" "iam_account_settings" { module "cbr_zone_schematics" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.33.4" + version = "1.33.7" name = "${var.prefix}-schematics-zone" zone_description = "CBR Network zone containing Schematics" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -39,7 +39,7 @@ module "cbr_zone_schematics" { module "event_notification" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "2.9.3" + version = "2.10.5" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags diff --git a/main.tf b/main.tf index 974f4b2b..694083d8 100644 --- a/main.tf +++ b/main.tf @@ -163,7 +163,7 @@ locals { module "cbr_rule" { count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0 source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.33.4" + version = "1.33.7" rule_description = var.cbr_rules[count.index].description enforcement_mode = var.cbr_rules[count.index].enforcement_mode rule_contexts = var.cbr_rules[count.index].rule_contexts diff --git a/modules/secrets/README.md b/modules/secrets/README.md index 6feaf8a6..8ab5badf 100644 --- a/modules/secrets/README.md +++ b/modules/secrets/README.md @@ -51,7 +51,7 @@ module "secrets_manager" { | Name | Source | Version | |------|--------|---------| | [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.15 | -| [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.9.0 | +| [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.9.1 | ### Resources diff --git a/modules/secrets/main.tf b/modules/secrets/main.tf index 55a55381..b5ab049b 100644 --- a/modules/secrets/main.tf +++ b/modules/secrets/main.tf @@ -60,7 +60,7 @@ locals { module "secrets" { for_each = { for obj in local.secrets : obj.secret_name => obj } source = "terraform-ibm-modules/secrets-manager-secret/ibm" - version = "1.9.0" + version = "1.9.1" region = var.existing_sm_instance_region secrets_manager_guid = var.existing_sm_instance_guid secret_group_id = each.value.secret_group_id diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 008262e3..22bc1c70 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -7,7 +7,7 @@ locals { module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" existing_resource_group_name = var.existing_resource_group_name } @@ -130,7 +130,7 @@ module "kms" { } count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.3.4" + version = "5.4.5" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn diff --git a/solutions/fully-configurable/version.tf b/solutions/fully-configurable/version.tf index 7c2a9559..915e808e 100644 --- a/solutions/fully-configurable/version.tf +++ b/solutions/fully-configurable/version.tf @@ -4,7 +4,7 @@ terraform { required_providers { ibm = { source = "IBM-Cloud/ibm" - version = "1.83.3" + version = "1.84.3" } time = { source = "hashicorp/time" diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index 45af7e6f..5ceb69bb 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -16,7 +16,7 @@ module "resource_group" { module "event_notifications" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "2.9.3" + version = "2.10.5" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags @@ -31,7 +31,7 @@ module "event_notifications" { module "key_protect" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.3.4" + version = "5.4.5" key_protect_instance_name = "${var.prefix}-key-protect" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/tests/go.mod b/tests/go.mod index 08c85b7c..39755e35 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -2,13 +2,13 @@ module github.com/terraform-ibm-modules/terraform-ibm-secrets-manager go 1.24.2 -toolchain go1.25.2 +toolchain go1.25.3 require ( github.com/IBM/go-sdk-core/v5 v5.21.0 github.com/gruntwork-io/terratest v0.51.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.15 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17 ) require ( diff --git a/tests/go.sum b/tests/go.sum index a2395436..4286572c 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -298,8 +298,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.15 h1:vTLAB97MQ45Hfla67pIWYnb/Z5YuEzRLjQ6WN4GHWgI= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.15/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17 h1:unGRxvM9OJBTsfDQg/AZCYOeJZ5TqrCsPphjWJ2wI94= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk= diff --git a/tests/new-rg/main.tf b/tests/new-rg/main.tf index d58e7f97..8b690292 100644 --- a/tests/new-rg/main.tf +++ b/tests/new-rg/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.3.0" + version = "1.4.0" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group