Skip to content

Commit 43f8b06

Browse files
fix(deps): update dependencies (#253)
1 parent 2539625 commit 43f8b06

File tree

12 files changed

+27
-24
lines changed

12 files changed

+27
-24
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ on:
88

99
jobs:
1010
call-terraform-ci-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.22.5
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.23.2
1212
secrets: inherit
1313
with:
1414
craSCCv2: true

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.22.5
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.23.2
1212
secrets: inherit

.secrets.baseline

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2023-12-09T06:39:44Z",
6+
"generated_at": "2025-10-04T03:59:34Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -77,7 +77,7 @@
7777
}
7878
],
7979
"results": {},
80-
"version": "0.13.1+ibm.62.dss",
80+
"version": "0.13.1+ibm.64.dss",
8181
"word_list": {
8282
"file": null,
8383
"hash": null

examples/apps/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ module "secrets_manager_public_cert_engine" {
4343
depends_on = [ibm_resource_instance.secrets_manager]
4444
count = var.existing_sm_instance_guid == null ? 1 : 0
4545
source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
46-
version = "1.1.14"
46+
version = "1.2.2"
4747
providers = {
4848
ibm = ibm.ibm-sm
4949
ibm.secret-store = ibm.ibm-sm
@@ -127,7 +127,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
127127

128128
module "cbr_vpc_zone" {
129129
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
130-
version = "1.33.2"
130+
version = "1.33.3"
131131
name = "${var.prefix}-VPC-network-zone"
132132
zone_description = "CBR Network zone representing VPC"
133133
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -139,7 +139,7 @@ module "cbr_vpc_zone" {
139139

140140
module "cbr_zone_schematics" {
141141
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
142-
version = "1.33.2"
142+
version = "1.33.3"
143143
name = "${var.prefix}-schematics-zone"
144144
zone_description = "CBR Network zone containing Schematics"
145145
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id

modules/project/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ You need the following permissions to run this module.
4040

4141
| Name | Source | Version |
4242
|------|--------|---------|
43-
| <a name="module_cbr_rules"></a> [cbr\_rules](#module\_cbr\_rules) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.2 |
43+
| <a name="module_cbr_rules"></a> [cbr\_rules](#module\_cbr\_rules) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.3 |
4444

4545
### Resources
4646

modules/project/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ resource "ibm_code_engine_project" "ce_project" {
1616
module "cbr_rules" {
1717
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
1818
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
19-
version = "1.33.2"
19+
version = "1.33.3"
2020
rule_description = var.cbr_rules[count.index].description
2121
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
2222
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/apps/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = "1.82.1"
7+
version = "1.83.1"
88
}
99
}
1010
}

solutions/project/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = "1.82.1"
7+
version = "1.83.1"
88
}
99
external = {
1010
source = "hashicorp/external"

tests/go.mod

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ go 1.24.0
55
toolchain go1.25.1
66

77
require (
8-
github.com/gruntwork-io/terratest v0.50.0
8+
github.com/gruntwork-io/terratest v0.51.0
99
github.com/stretchr/testify v1.11.1
10-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.6
10+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.10
1111
)
1212

1313
require (
@@ -90,6 +90,7 @@ require (
9090
go.opentelemetry.io/otel v1.35.0 // indirect
9191
go.opentelemetry.io/otel/metric v1.35.0 // indirect
9292
go.opentelemetry.io/otel/trace v1.35.0 // indirect
93+
go.yaml.in/yaml/v2 v2.4.2 // indirect
9394
golang.org/x/crypto v0.41.0 // indirect
9495
golang.org/x/mod v0.26.0 // indirect
9596
golang.org/x/net v0.42.0 // indirect
@@ -100,5 +101,5 @@ require (
100101
gopkg.in/warnings.v0 v0.1.2 // indirect
101102
gopkg.in/yaml.v2 v2.4.0 // indirect
102103
gopkg.in/yaml.v3 v3.0.1 // indirect
103-
sigs.k8s.io/yaml v1.4.0 // indirect
104+
sigs.k8s.io/yaml v1.6.0 // indirect
104105
)

0 commit comments

Comments
 (0)