Skip to content

Commit 7af563c

Browse files
fix(deps): update dependencies (#869)
1 parent 0ad1a56 commit 7af563c

File tree

12 files changed

+65
-65
lines changed

12 files changed

+65
-65
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ on:
77
- created
88
jobs:
99
call-terraform-ci-pipeline:
10-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.23.2
10+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.24.0
1111
secrets: inherit
1212
with:
1313
craSCCv2: true

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.23.2
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.24.0
1212
secrets: inherit

README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,13 @@ Optionally, the module supports advanced security group management for the worke
3030
* [kube-audit](./modules/kube-audit)
3131
* [worker-pool](./modules/worker-pool)
3232
* [Examples](./examples)
33-
* <div style="display: inline-block;"><a href="./examples/add_rules_to_sg">Cluster security group rules example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-add_rules_to_sg-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/add_rules_to_sg" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
34-
* <div style="display: inline-block;"><a href="./examples/advanced">Advanced example (mzr, auto-scale, kms, taints)</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-advanced-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/advanced" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
35-
* <div style="display: inline-block;"><a href="./examples/basic">Basic single zone cluster with allowed outbound traffic</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-basic-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/basic" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
36-
* <div style="display: inline-block;"><a href="./examples/cross_kms_support">Cross account KMS encryption example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-cross_kms_support-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/cross_kms_support" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
37-
* <div style="display: inline-block;"><a href="./examples/custom_sg">Attaching custom security groups</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-custom_sg-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/custom_sg" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
38-
* <div style="display: inline-block;"><a href="./examples/fscloud">Financial Services compliant example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-fscloud-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/fscloud" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
39-
* <div style="display: inline-block;"><a href="./examples/multiple_mzr_clusters">2 MZR clusters in same VPC example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-multiple_mzr_clusters-example&repository=github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/multiple_mzr_clusters" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
33+
* <div style="display: inline-block;"><a href="./examples/add_rules_to_sg">Cluster security group rules example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-add_rules_to_sg-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/add_rules_to_sg" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
34+
* <div style="display: inline-block;"><a href="./examples/advanced">Advanced example (mzr, auto-scale, kms, taints)</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-advanced-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/advanced" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
35+
* <div style="display: inline-block;"><a href="./examples/basic">Basic single zone cluster with allowed outbound traffic</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-basic-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/basic" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
36+
* <div style="display: inline-block;"><a href="./examples/cross_kms_support">Cross account KMS encryption example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-cross_kms_support-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/cross_kms_support" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
37+
* <div style="display: inline-block;"><a href="./examples/custom_sg">Attaching custom security groups</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-custom_sg-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/custom_sg" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
38+
* <div style="display: inline-block;"><a href="./examples/fscloud">Financial Services compliant example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-fscloud-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/fscloud" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
39+
* <div style="display: inline-block;"><a href="./examples/multiple_mzr_clusters">2 MZR clusters in same VPC example</a></div> <div style="display: inline-block; vertical-align: middle;"><a href="https://cloud.ibm.com/schematics/workspaces/create?workspace_name=bov-multiple_mzr_clusters-example&repository=https://github.com/terraform-ibm-modules/terraform-ibm-base-ocp-vpc/tree/main/examples/multiple_mzr_clusters" target="_blank"><img src="https://cloud.ibm.com/media/docs/images/icons/Deploy_to_cloud.svg" alt="Deploy to IBM Cloud button"></a></div>
4040
* [Contributing](#contributing)
4141
<!-- END OVERVIEW HOOK -->
4242

@@ -302,8 +302,8 @@ Optionally, you need the following permissions to attach Access Management tags
302302
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
303303
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
304304
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.8.0 |
305-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.8 |
306-
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 10.5.8 |
305+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.34.0 |
306+
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 10.5.11 |
307307
| <a name="module_existing_secrets_manager_instance_parser"></a> [existing\_secrets\_manager\_instance\_parser](#module\_existing\_secrets\_manager\_instance\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.0 |
308308
| <a name="module_worker_pools"></a> [worker\_pools](#module\_worker\_pools) | ./modules/worker-pool | n/a |
309309

examples/advanced/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ locals {
2222

2323
module "kp_all_inclusive" {
2424
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
25-
version = "5.4.10"
25+
version = "5.5.0"
2626
key_protect_instance_name = "${var.prefix}-kp-instance"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region
@@ -243,7 +243,7 @@ module "cloud_logs" {
243243

244244
module "trusted_profile" {
245245
source = "terraform-ibm-modules/trusted-profile/ibm"
246-
version = "3.1.1"
246+
version = "3.2.0"
247247
trusted_profile_name = "${var.prefix}-profile"
248248
trusted_profile_description = "Logs agent Trusted Profile"
249249
# As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs.
@@ -270,7 +270,7 @@ module "trusted_profile" {
270270
module "logs_agents" {
271271
depends_on = [module.kube_audit]
272272
source = "terraform-ibm-modules/logs-agent/ibm"
273-
version = "1.13.0"
273+
version = "1.14.0"
274274
cluster_id = module.ocp_base.cluster_id
275275
cluster_resource_group_id = module.resource_group.resource_group_id
276276
logs_agent_trusted_profile_id = module.trusted_profile.trusted_profile.id

examples/fscloud/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "cos_fscloud" {
1818
source = "terraform-ibm-modules/cos/ibm"
19-
version = "10.5.8"
19+
version = "10.5.11"
2020
resource_group_id = module.resource_group.resource_group_id
2121
create_cos_bucket = false
2222
cos_instance_name = "${var.prefix}-cos"
@@ -30,7 +30,7 @@ module "cos_fscloud" {
3030

3131
module "flowlogs_bucket" {
3232
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
33-
version = "10.5.8"
33+
version = "10.5.11"
3434

3535
bucket_configs = [
3636
{
@@ -112,7 +112,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
112112

113113
module "cbr_vpc_zone" {
114114
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
115-
version = "1.33.8"
115+
version = "1.34.0"
116116
name = "${var.prefix}-VPC-network-zone"
117117
zone_description = "CBR Network zone representing VPC"
118118
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -124,7 +124,7 @@ module "cbr_vpc_zone" {
124124

125125
module "cbr_zone_schematics" {
126126
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
127-
version = "1.33.8"
127+
version = "1.34.0"
128128
name = "${var.prefix}-schematics-zone"
129129
zone_description = "CBR Network zone containing Schematics"
130130
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -139,7 +139,7 @@ module "cbr_zone_schematics" {
139139

140140
module "cbr_rules" {
141141
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
142-
version = "1.33.8"
142+
version = "1.34.0"
143143
rule_description = "${var.prefix} rule for vpc flow log access to cos"
144144
enforcement_mode = "enabled"
145145
resources = [{

examples/multiple_mzr_clusters/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ data "ibm_container_cluster_config" "cluster_config_c2" {
173173

174174
module "monitoring_instance" {
175175
source = "terraform-ibm-modules/cloud-monitoring/ibm"
176-
version = "1.10.8"
176+
version = "1.11.0"
177177
resource_group_id = module.resource_group.resource_group_id
178178
region = var.region
179179
plan = "graduated-tier"
@@ -190,7 +190,7 @@ module "monitoring_agent_1" {
190190
helm = helm.helm_cluster_1
191191
}
192192
source = "terraform-ibm-modules/monitoring-agent/ibm"
193-
version = "1.13.0"
193+
version = "1.15.0"
194194
cluster_id = module.ocp_base_cluster_1.cluster_id
195195
cluster_resource_group_id = module.resource_group.resource_group_id
196196
access_key = module.monitoring_instance.access_key
@@ -202,7 +202,7 @@ module "monitoring_agent_2" {
202202
helm = helm.helm_cluster_2
203203
}
204204
source = "terraform-ibm-modules/monitoring-agent/ibm"
205-
version = "1.13.0"
205+
version = "1.15.0"
206206
cluster_id = module.ocp_base_cluster_2.cluster_id
207207
cluster_resource_group_id = module.resource_group.resource_group_id
208208
access_key = module.monitoring_instance.access_key

main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ module "cos_instance" {
108108
count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0
109109

110110
source = "terraform-ibm-modules/cos/ibm"
111-
version = "10.5.8"
111+
version = "10.5.11"
112112
cos_instance_name = local.cos_name
113113
resource_group_id = var.resource_group_id
114114
cos_plan = local.cos_plan
@@ -704,7 +704,7 @@ locals {
704704
module "cbr_rule" {
705705
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
706706
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
707-
version = "1.33.8"
707+
version = "1.34.0"
708708
rule_description = var.cbr_rules[count.index].description
709709
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
710710
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/fully-configurable/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ module "kms" {
9595
}
9696
count = (var.kms_encryption_enabled_boot_volume && var.existing_boot_volume_kms_key_crn == null) || (var.kms_encryption_enabled_cluster && var.existing_cluster_kms_key_crn == null) ? 1 : 0
9797
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
98-
version = "5.4.10"
98+
version = "5.5.0"
9999
create_key_protect_instance = false
100100
region = local.cluster_kms_region
101101
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -279,7 +279,7 @@ module "secret_group" {
279279
}
280280
count = var.enable_secrets_manager_integration && var.secrets_manager_secret_group_id == null ? 1 : 0
281281
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
282-
version = "1.3.17"
282+
version = "1.3.18"
283283
region = module.existing_secrets_manager_instance_parser[0].region
284284
secrets_manager_guid = module.existing_secrets_manager_instance_parser[0].service_instance
285285
secret_group_name = module.ocp_base.cluster_id

tests/existing-resources/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ module "vpc" {
5454

5555
module "cos" {
5656
source = "terraform-ibm-modules/cos/ibm"
57-
version = "10.5.8"
57+
version = "10.5.11"
5858
resource_group_id = module.resource_group.resource_group_id
5959
region = var.region
6060
cos_instance_name = "${var.prefix}-cos"

0 commit comments

Comments
 (0)