Skip to content

Conversation

@terraform-ibm-modules-ops
Copy link
Contributor

This PR contains the following updates:

Package Type Update Change
github.com/IBM/secrets-manager-go-sdk require major v1.2.0 -> v2.0.11

Release Notes

IBM/secrets-manager-go-sdk (github.com/IBM/secrets-manager-go-sdk)

v2.0.11

Compare Source

This release introduces a new secret type: Custom credentials. Read more about it in the service documentation.

v2.0.10

Compare Source

You can now use an Imported certificate secret to generate a Certificate Signing Reques (CSR) that you can then externally sign with your Certificate Authority and add it back to your Imported certificate secret.

Note

The function signature for the following functions has changed

  • NewPublicCertificatePrototype: common name is no longer required.
  • NewImportedCertificatePrototype: certificate is no longer required.

v2.0.9

Compare Source

Package updates.

v2.0.8

Compare Source

  • Support for intermediate CA certificates rotation

v2.0.7

Compare Source

Support for IAM service authorization

v2.0.6

Compare Source

Add the expiration_date field to secret versions' response.

v2.0.5

Compare Source

You can use the Private Certificate engine to generate Root and Intermediate CA certificates with private keys managed by a Hardware Security Module (HSM). This feature is currently available using IBM Cloud HPCS HSM.

v2.0.4

Compare Source

  • Add List filters: secret_types, match_all_labels
  • Add Expiration date field to iam_credentials and service_credentials API responses

v2.0.3

Compare Source

This release adds support fora random password generator policy, allowing you to control the length and complexity of the auto-generated password (numbers, symbols, upper-case).

v2.0.2

Compare Source

This release provides support for a new secret type - Service credentials. Learn more in the service documentation and API Docs.

v2.0.1

Compare Source

This release provides support for retrieving the secret value by using its secret Name. Learn more in the service documentation and API Docs.

v2.0.0

A new version of the Secrets Manager SDKs is now available. The following updates are included in this release.

  • You no longer need to include secret_type in the API URL to identify a secret.
  • The secret group name must be unique per Secrets Manager instance.
  • Resources updates are defined as HTTP patch operations.
  • The configurations API follows the pattern of the Secrets Manager API. config_type acts as the API discriminator, similarly to secret_type.
  • Configurations are modeled as openAPI composites with metadata and data parts, similarly to the Secrets Manager model. Mappings between IAM roles and configurations API follow the same pattern for the Secrets Manager API. For example, an IAM viewer can list configurations to view their metadata.
  • List operations return metadata only for secret, secret version, and config resources.
  • The action to rotate a secret is now the create a new secret version API: POST/v2/secrets/{id}/versions.
  • The action to restore secret version is now the create a new secret version API with the restored_from_version body parameter.
  • The action to delete IAM credentials is now the delete a secret version data API: DELETE /v2/secrets/{id}/versions/{version_id}/secret_data.
  • Policies API is now embedded into the metadata API in version 2.0.
  • The actions to list Secrets and get secret metadata return the versions_total field. The version's content is not included.
  • Current and previous secret versions can be referenced by using the current and previous aliases in version APIs.
  • The secret lock mode names exclusive and exclusive_delete are replaced by remove_previous and remove_previous_and delete. The modes still perform the same action, only the names changed.
    For more information, check out the API docs.

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@terraform-ibm-modules-ops
Copy link
Contributor Author

ℹ Artifact update notice

File name: tests/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 2 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.23.0 -> 1.24.2
github.com/IBM/go-sdk-core/v5 v5.19.1 -> v5.19.1
go.mongodb.org/mongo-driver v1.17.2 -> v1.17.3

@terraform-ibm-modules-dev

/run pipeline

1 similar comment
@terraform-ibm-modules-dev

/run pipeline

@terraform-ibm-modules-dev terraform-ibm-modules-dev merged commit 1854629 into main Jun 29, 2025
2 checks passed
@terraform-ibm-modules-dev terraform-ibm-modules-dev deleted the renovate/major-ci-dependencies branch June 29, 2025 03:19
@terraform-ibm-modules-ops
Copy link
Contributor Author

🎉 This PR is included in version 2.0.0 🎉

The release is available on:

Your semantic-release bot 📦🚀

@terraform-ibm-modules-ops
Copy link
Contributor Author

🎉 This PR is included in version 2.0.0 🎉

The release is available on:

Your semantic-release bot 📦🚀

2 similar comments
@terraform-ibm-modules-ops
Copy link
Contributor Author

🎉 This PR is included in version 2.0.0 🎉

The release is available on:

Your semantic-release bot 📦🚀

@terraform-ibm-modules-ops
Copy link
Contributor Author

🎉 This PR is included in version 2.0.0 🎉

The release is available on:

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants