diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index 95b2acb..bc2a5e1 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -8,5 +8,5 @@ on: jobs: call-terraform-ci-pipeline: - uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.24.0 + uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.24.1 secrets: inherit diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 7017d3f..3e982cb 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -8,5 +8,5 @@ on: jobs: call-terraform-release-pipeline: - uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.24.0 + uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.24.1 secrets: inherit diff --git a/common-dev-assets b/common-dev-assets index 238892d..758c4b5 160000 --- a/common-dev-assets +++ b/common-dev-assets @@ -1 +1 @@ -Subproject commit 238892dddce116998ab6b6ebdb998708401174d1 +Subproject commit 758c4b5646a6348f0d35d910c85eac1b4f58b080 diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 960797f..ed976a1 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.4.0" + version = "1.4.7" existing_resource_group_name = var.existing_resource_group_name } @@ -17,14 +17,14 @@ locals { } module "existing_sm_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.7" crn = var.existing_secrets_manager_instance_crn } module "application_loadbalancer_listener_certificate_crn_parser" { count = var.application_loadbalancer_listener_certificate_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.7" crn = var.application_loadbalancer_listener_certificate_crn } @@ -32,7 +32,7 @@ module "application_loadbalancer_listener_certificate_crn_parser" { module "secrets_manager_secret_group" { count = var.application_loadbalancer_listener_certificate_crn == null && var.existing_secrets_manager_secret_group_id == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.32" region = module.existing_sm_crn_parser.region secrets_manager_guid = module.existing_sm_crn_parser.service_instance secret_group_name = (var.prefix != null && var.prefix != "") ? "${var.prefix}-cert-secret-group" : "cert-secret-group" @@ -46,7 +46,7 @@ module "secrets_manager_secret_group" { module "secrets_manager_private_certificate" { count = var.application_loadbalancer_listener_certificate_crn == null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.7.0" + version = "1.10.6" cert_name = (var.prefix != null && var.prefix != "") ? "${var.prefix}-cts-vpn-private-cert" : "cts-vpn-private-cert" cert_description = "private certificate for client to site VPN connection" cert_template = var.private_cert_engine_config_template_name @@ -66,7 +66,7 @@ module "secrets_manager_private_certificate" { module "existing_vpc_crn_parser" { count = var.existing_vpc_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.7" crn = var.existing_vpc_crn } @@ -124,7 +124,7 @@ resource "ibm_is_lb_listener" "alb_frontend_listener" { module "private_path" { source = "terraform-ibm-modules/vpc-private-path/ibm" - version = "1.5.0" + version = "1.5.5" resource_group_id = module.resource_group.resource_group_id subnet_id = local.subnet_id tags = var.private_path_tags diff --git a/solutions/fully-configurable/version.tf b/solutions/fully-configurable/version.tf index a361abc..c9f2d0a 100644 --- a/solutions/fully-configurable/version.tf +++ b/solutions/fully-configurable/version.tf @@ -4,7 +4,7 @@ terraform { # Lock deployable architecture into an exact provider version - renovate automation will keep it updated ibm = { source = "ibm-cloud/ibm" - version = "1.85.0" + version = "1.86.1" } } } diff --git a/tests/go.mod b/tests/go.mod index 99492a3..d67dc31 100644 --- a/tests/go.mod +++ b/tests/go.mod @@ -6,7 +6,7 @@ require ( github.com/IBM/go-sdk-core/v5 v5.21.2 github.com/gruntwork-io/terratest v0.54.0 github.com/stretchr/testify v1.11.1 - github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.0 + github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.1 ) require ( @@ -35,7 +35,7 @@ require ( github.com/go-logr/logr v1.4.2 // indirect github.com/go-logr/stdr v1.2.2 // indirect github.com/go-openapi/analysis v0.23.0 // indirect - github.com/go-openapi/errors v0.22.5 // indirect + github.com/go-openapi/errors v0.22.6 // indirect github.com/go-openapi/jsonpointer v0.21.1 // indirect github.com/go-openapi/jsonreference v0.21.0 // indirect github.com/go-openapi/loads v0.22.0 // indirect diff --git a/tests/go.sum b/tests/go.sum index d7a5dfb..f9b54fa 100644 --- a/tests/go.sum +++ b/tests/go.sum @@ -83,8 +83,8 @@ github.com/go-openapi/analysis v0.23.0 h1:aGday7OWupfMs+LbmLZG4k0MYXIANxcuBTYUC0 github.com/go-openapi/analysis v0.23.0/go.mod h1:9mz9ZWaSlV8TvjQHLl2mUW2PbZtemkE8yA5v22ohupo= github.com/go-openapi/errors v0.19.8/go.mod h1:cM//ZKUKyO06HSwqAelJ5NsEMMcpa6VpXe8DOa1Mi1M= github.com/go-openapi/errors v0.20.3/go.mod h1:Z3FlZ4I8jEGxjUK+bugx3on2mIAk4txuAOhlsB1FSgk= -github.com/go-openapi/errors v0.22.5 h1:Yfv4O/PRYpNF3BNmVkEizcHb3uLVVsrDt3LNdgAKRY4= -github.com/go-openapi/errors v0.22.5/go.mod h1:z9S8ASTUqx7+CP1Q8dD8ewGH/1JWFFLX/2PmAYNQLgk= +github.com/go-openapi/errors v0.22.6 h1:eDxcf89O8odEnohIXwEjY1IB4ph5vmbUsBMsFNwXWPo= +github.com/go-openapi/errors v0.22.6/go.mod h1:z9S8ASTUqx7+CP1Q8dD8ewGH/1JWFFLX/2PmAYNQLgk= github.com/go-openapi/jsonpointer v0.21.1 h1:whnzv/pNXtK2FbX/W9yJfRmE2gsmkfahjMKB0fZvcic= github.com/go-openapi/jsonpointer v0.21.1/go.mod h1:50I1STOfbY1ycR8jGz8DaMeLCdXiI6aDteEdRNNzpdk= github.com/go-openapi/jsonreference v0.21.0 h1:Rs+Y7hSXT83Jacb7kFyjn4ijOuVGSvOdF2+tg1TRrwQ= @@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4= github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U= github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.0 h1:uaGN3RMlOpmkqCXPjlygPiCqnGhszYP6YU3rWWsp0wc= -github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.0/go.mod h1:HqX0S0Ue19y7TJRGR5+Np2Aq0xElgw3mM3zZCWwQc1I= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.1 h1:DTEreyr7dQQdAp36UbdjiZBS8C6BxVn9kpvR3ZqcV5s= +github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.64.1/go.mod h1:ZAjHMb7i4CWS+jiFbnbMGVBKMj9i6B4XmC6js94XlF4= github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk= github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw= github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk= diff --git a/tests/resources/main.tf b/tests/resources/main.tf index 1c0afd9..29c67a9 100644 --- a/tests/resources/main.tf +++ b/tests/resources/main.tf @@ -4,7 +4,7 @@ module "mock_resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.4.3" + version = "1.4.7" resource_group_name = "${var.prefix}-mock-rg" } @@ -81,7 +81,7 @@ resource "ibm_is_floating_ip" "ip" { ################################################################################ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.4.0" + version = "1.4.7" resource_group_name = "${var.prefix}-rg" } @@ -126,7 +126,7 @@ locals { module "existing_sm_crn_parser" { count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.2.0" + version = "1.3.7" crn = var.existing_secrets_manager_instance_crn } @@ -134,7 +134,7 @@ module "existing_sm_crn_parser" { module "secrets_manager_group" { count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-secret-group/ibm" - version = "1.3.15" + version = "1.3.32" region = local.sm_region secrets_manager_guid = local.secrets_manager_guid secret_group_name = "${var.prefix}-cert-secret-group" @@ -148,7 +148,7 @@ module "secrets_manager_group" { module "secrets_manager_private_certificate" { count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/secrets-manager-private-cert/ibm" - version = "1.7.0" + version = "1.10.6" cert_name = "${var.prefix}-cts-vpn-private-cert" cert_description = "an example private cert" cert_template = var.certificate_template_name