From 2b5e0da3a646ccd1df8b59ad7f1267ffc7541dcb Mon Sep 17 00:00:00 2001 From: Terraform IBM Modules Operations Date: Sat, 8 Nov 2025 07:49:00 +0000 Subject: [PATCH] fix(deps): update dependencies --- README.md | 10 +++++----- common-dev-assets | 2 +- examples/advanced/main.tf | 14 +++++++------- examples/fscloud/main.tf | 6 +++--- main.tf | 4 ++-- modules/secrets/README.md | 2 +- modules/secrets/main.tf | 2 +- solutions/fully-configurable/main.tf | 6 +++--- tests/existing-resources/main.tf | 4 ++-- tests/go.mod | 8 ++++---- tests/go.sum | 12 ++++++------ 11 files changed, 35 insertions(+), 35 deletions(-) diff --git a/README.md b/README.md index 460dc707..12de73ff 100644 --- a/README.md +++ b/README.md @@ -19,9 +19,9 @@ This module is used to provision and configure an IBM Cloud [Secrets Manager](ht * [fscloud](./modules/fscloud) * [secrets](./modules/secrets) * [Examples](./examples) - * [Advanced example](./examples/advanced) - * [Basic example](./examples/basic) - * [Financial Services Cloud profile example with KYOK encryption](./examples/fscloud) + *
Advanced example
Deploy to IBM Cloud button
+ *
Basic example
Deploy to IBM Cloud button
+ *
Financial Services Cloud profile example with KYOK encryption
Deploy to IBM Cloud button
* [Contributing](#contributing) @@ -72,8 +72,8 @@ You need the following permissions to run this module. | Name | Source | Version | |------|--------|---------| -| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.7 | -| [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 | +| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.8 | +| [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.0 | | [secrets](#module\_secrets) | ./modules/secrets | n/a | ### Resources diff --git a/common-dev-assets b/common-dev-assets index c4328778..fc1a2725 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit c4328778ce1a62bc85f641d9249adaac0493cfc9 +Subproject commit fc1a27254f57a7815ba98c523fc1ef0c73df6790 diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf index bb077321..50bdbe32 100644 --- a/examples/advanced/main.tf +++ b/examples/advanced/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "key_protect" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.4.5" + version = "5.4.9" key_protect_instance_name = "${var.prefix}-key-protect" resource_group_id = module.resource_group.resource_group_id region = var.region @@ -39,7 +39,7 @@ module "key_protect" { module "event_notifications" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "2.10.5" + version = "2.10.12" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags @@ -124,7 +124,7 @@ module "secrets_manager" { # Create new code engine project module "code_engine_project" { source = "terraform-ibm-modules/code-engine/ibm//modules/project" - version = "4.6.9" + version = "4.6.10" name = "${var.prefix}-project" resource_group_id = module.resource_group.resource_group_id } @@ -137,7 +137,7 @@ locals { module "code_engine_secret" { source = "terraform-ibm-modules/code-engine/ibm//modules/secret" - version = "4.6.9" + version = "4.6.10" name = "${var.prefix}-rs" project_id = module.code_engine_project.id format = "registry" @@ -157,7 +157,7 @@ resource "ibm_cr_namespace" "rg_namespace" { # Build example Go application in Code Engine project which dynamically generates User IBM Cloud IAM API Keys module "code_engine_build" { source = "terraform-ibm-modules/code-engine/ibm//modules/build" - version = "4.6.9" + version = "4.6.10" name = "${var.prefix}-build" region = var.region ibmcloud_api_key = var.ibmcloud_api_key @@ -186,7 +186,7 @@ locals { module "code_engine_job" { depends_on = [module.code_engine_build] source = "terraform-ibm-modules/code-engine/ibm//modules/job" - version = "4.6.9" + version = "4.6.10" name = "${var.prefix}-job" image_reference = local.output_image image_secret = module.code_engine_secret.name @@ -207,7 +207,7 @@ module "code_engine_job" { module "custom_credential_engine" { depends_on = [module.secrets_manager, module.code_engine_job] source = "terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm" - version = "1.0.6" + version = "1.0.8" secrets_manager_guid = module.secrets_manager.secrets_manager_guid secrets_manager_region = module.secrets_manager.secrets_manager_region custom_credential_engine_name = "${var.prefix}-test-custom-engine" diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 23c0986e..81435f17 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -20,7 +20,7 @@ data "ibm_iam_account_settings" "iam_account_settings" { module "cbr_zone_schematics" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.33.7" + version = "1.33.8" name = "${var.prefix}-schematics-zone" zone_description = "CBR Network zone containing Schematics" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -39,7 +39,7 @@ module "cbr_zone_schematics" { module "event_notification" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "2.10.5" + version = "2.10.12" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags @@ -53,7 +53,7 @@ module "event_notification" { module "kms_key_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.kms_key_crn } diff --git a/main.tf b/main.tf index 694083d8..2a08ca3c 100644 --- a/main.tf +++ b/main.tf @@ -81,7 +81,7 @@ locals { module "kms_key_crn_parser" { count = var.kms_encryption_enabled ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.kms_key_crn != null ? var.kms_key_crn : "" } @@ -163,7 +163,7 @@ locals { module "cbr_rule" { count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0 source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.33.7" + version = "1.33.8" rule_description = var.cbr_rules[count.index].description enforcement_mode = var.cbr_rules[count.index].enforcement_mode rule_contexts = var.cbr_rules[count.index].rule_contexts diff --git a/modules/secrets/README.md b/modules/secrets/README.md index 8ab5badf..7c993234 100644 --- a/modules/secrets/README.md +++ b/modules/secrets/README.md @@ -50,7 +50,7 @@ module "secrets_manager" { | Name | Source | Version | |------|--------|---------| -| [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.15 | +| [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.16 | | [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.9.1 | ### Resources diff --git a/modules/secrets/main.tf b/modules/secrets/main.tf index b5ab049b..f9216e96 100644 --- a/modules/secrets/main.tf +++ b/modules/secrets/main.tf @@ -25,7 +25,7 @@ data "ibm_sm_secret_groups" "existing_secret_groups" { module "secret_groups" { for_each = { for obj in local.secret_groups : obj.secret_group_name => obj } source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.16" region = var.existing_sm_instance_region secrets_manager_guid = var.existing_sm_instance_guid secret_group_name = each.value.secret_group_name diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 22bc1c70..1b7240d8 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -44,14 +44,14 @@ data "ibm_iam_account_settings" "iam_account_settings" { module "kms_instance_crn_parser" { count = var.existing_kms_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.existing_kms_instance_crn } module "kms_key_crn_parser" { count = var.existing_secrets_manager_kms_key_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.0" crn = var.existing_secrets_manager_kms_key_crn } @@ -130,7 +130,7 @@ module "kms" { } count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.4.5" + version = "5.4.9" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index 5ceb69bb..92695111 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "event_notifications" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "2.10.5" + version = "2.10.12" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags @@ -31,7 +31,7 @@ module "event_notifications" { module "key_protect" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.4.5" + version = "5.4.9" key_protect_instance_name = "${var.prefix}-key-protect" resource_group_id = module.resource_group.resource_group_id region = var.region diff --git a/tests/go.mod b/tests/go.mod index 39755e35..3b9cb90b 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -2,13 +2,13 @@ module github.com/terraform-ibm-modules/terraform-ibm-secrets-manager go 1.24.2 -toolchain go1.25.3 +toolchain go1.25.4 require ( github.com/IBM/go-sdk-core/v5 v5.21.0 - github.com/gruntwork-io/terratest v0.51.0 + github.com/gruntwork-io/terratest v0.52.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20 ) require ( @@ -16,7 +16,7 @@ require ( github.com/IBM-Cloud/bluemix-go v0.0.0-20240719075425-078fcb3a55be // indirect github.com/IBM-Cloud/power-go-client v1.13.0 // indirect github.com/IBM/cloud-databases-go-sdk v0.8.1 // indirect - github.com/IBM/platform-services-go-sdk v0.89.0 // indirect + github.com/IBM/platform-services-go-sdk v0.90.0 // indirect github.com/IBM/project-go-sdk v0.3.9 // indirect github.com/IBM/schematics-go-sdk v0.4.0 // indirect github.com/IBM/vpc-go-sdk v1.0.2 // indirect diff --git a/tests/go.sum b/tests/go.sum index 4286572c..eac150ca 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -9,8 +9,8 @@ github.com/IBM/cloud-databases-go-sdk v0.8.1/go.mod h1:JYucI1PdwqbAd8XGdDAchxzxR github.com/IBM/go-sdk-core/v5 v5.9.2/go.mod h1:YlOwV9LeuclmT/qi/LAK2AsobbAP42veV0j68/rlZsE= github.com/IBM/go-sdk-core/v5 v5.21.0 h1:DUnYhvC4SoC8T84rx5omnhY3+xcQg/Whyoa3mDPIMkk= github.com/IBM/go-sdk-core/v5 v5.21.0/go.mod h1:Q3BYO6iDA2zweQPDGbNTtqft5tDcEpm6RTuqMlPcvbw= -github.com/IBM/platform-services-go-sdk v0.89.0 h1:fIvKR1bQchPoMUXQf69gaRKak/giVAkRDISiAX8TlE8= -github.com/IBM/platform-services-go-sdk v0.89.0/go.mod h1:aGD045m6I8pfcB77wft8w2cHqWOJjcM3YSSV55BX0Js= +github.com/IBM/platform-services-go-sdk v0.90.0 h1:hsUkgZZBGYK+szFb0tF9Q7uy1VjMY+VlYAPgPwFPMrg= +github.com/IBM/platform-services-go-sdk v0.90.0/go.mod h1:aGD045m6I8pfcB77wft8w2cHqWOJjcM3YSSV55BX0Js= github.com/IBM/project-go-sdk v0.3.9 h1:D/UfMMn+vMQyvYf9EfocV6HrD3HcVpeIVoUSjNKuROo= github.com/IBM/project-go-sdk v0.3.9/go.mod h1:FOJM9ihQV3EEAY6YigcWiTNfVCThtdY8bLC/nhQHFvo= github.com/IBM/schematics-go-sdk v0.4.0 h1:x01f/tPquYJYLQzJLGuxWfCbV/EdSMXRikOceNy/JLM= @@ -150,8 +150,8 @@ github.com/google/uuid v1.1.1/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+ github.com/google/uuid v1.3.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0= github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= -github.com/gruntwork-io/terratest v0.51.0 h1:RCXlCwWlHqhUoxgF6n3hvywvbvrsTXqoqt34BrnLekw= -github.com/gruntwork-io/terratest v0.51.0/go.mod h1:evZHXb8VWDgv5O5zEEwfkwMhkx9I53QR/RB11cISrpg= +github.com/gruntwork-io/terratest v0.52.0 h1:7+I3FqEImowIajZ9Qyo5ngr7n2AUINJko6x+KzlWNjU= +github.com/gruntwork-io/terratest v0.52.0/go.mod h1:y2Evi+Ac04QpzF3mbRPqrBjipDN7gjqlw6+OZoy2vX4= github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4= github.com/hashicorp/errwrap v1.1.0 h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY2I= github.com/hashicorp/errwrap v1.1.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4= @@ -298,8 +298,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17 h1:unGRxvM9OJBTsfDQg/AZCYOeJZ5TqrCsPphjWJ2wI94= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.17/go.mod h1:g0kmBhFk6pVoTmse42tMNCSNktiOYJHAda/pAzOIxco= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20 h1:jESkPVhbtjVGnZFEg227spKiA+p0nAA4pslMmA8OhYw= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.20/go.mod h1:c1PLKvLVUfjjnzbIJ2Q59/mjOV9SWtYA5p/5k0JvER0= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=