Skip to content

Commit 987c3e9

Browse files
fix(deps): update dependencies
1 parent d3f33bb commit 987c3e9

File tree

12 files changed

+26
-26
lines changed

12 files changed

+26
-26
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -514,11 +514,11 @@ You need the following permissions to run this module.
514514
| Name | Description | Type | Default | Required |
515515
|------|-------------|------|---------|:--------:|
516516
| <a name="input_eso_chart_location"></a> [eso\_chart\_location](#input\_eso\_chart\_location) | The location of the External Secrets Operator Helm chart. | `string` | `"https://charts.external-secrets.io"` | no |
517-
| <a name="input_eso_chart_version"></a> [eso\_chart\_version](#input\_eso\_chart\_version) | The version of the External Secrets Operator Helm chart. Ensure that the chart version is compatible with the image version specified in eso\_image\_version. | `string` | `"1.0.0"` | no |
517+
| <a name="input_eso_chart_version"></a> [eso\_chart\_version](#input\_eso\_chart\_version) | The version of the External Secrets Operator Helm chart. Ensure that the chart version is compatible with the image version specified in eso\_image\_version. | `string` | `"1.1.0"` | no |
518518
| <a name="input_eso_cluster_nodes_configuration"></a> [eso\_cluster\_nodes\_configuration](#input\_eso\_cluster\_nodes\_configuration) | Configuration to use to customise ESO deployment on specific cluster nodes. Setting appropriate values will result in customising ESO helm release. Default value is null to keep ESO standard deployment. | <pre>object({<br/> nodeSelector = object({<br/> label = string<br/> value = string<br/> })<br/> tolerations = object({<br/> key = string<br/> operator = string<br/> value = string<br/> effect = string<br/> })<br/> })</pre> | `null` | no |
519519
| <a name="input_eso_enroll_in_servicemesh"></a> [eso\_enroll\_in\_servicemesh](#input\_eso\_enroll\_in\_servicemesh) | Flag to enroll ESO into istio servicemesh | `bool` | `false` | no |
520520
| <a name="input_eso_image"></a> [eso\_image](#input\_eso\_image) | The External Secrets Operator image in the format of `[registry-url]/[namespace]/[image]`. | `string` | `"ghcr.io/external-secrets/external-secrets"` | no |
521-
| <a name="input_eso_image_version"></a> [eso\_image\_version](#input\_eso\_image\_version) | The version or digest for the external secrets image to deploy. If changing the value, ensure it is compatible with the chart version set in eso\_chart\_version. | `string` | `"v1.0.0-ubi@sha256:b7a6c7ea483ca1aa1ee4199bc2708338f1385f5a22d7405068f1393d9d6b6dd5"` | no |
521+
| <a name="input_eso_image_version"></a> [eso\_image\_version](#input\_eso\_image\_version) | The version or digest for the external secrets image to deploy. If changing the value, ensure it is compatible with the chart version set in eso\_chart\_version. | `string` | `"v1.1.0-ubi@sha256:f27619afa57ca66cdde88ff46493cd114eb177a8f97414dcfa8a9394b959c741"` | no |
522522
| <a name="input_eso_namespace"></a> [eso\_namespace](#input\_eso\_namespace) | Namespace to create and be used to install ESO components including helm releases. | `string` | `null` | no |
523523
| <a name="input_eso_pod_configuration"></a> [eso\_pod\_configuration](#input\_eso\_pod\_configuration) | Configuration to use to customise ESO deployment on specific pods. Setting appropriate values will result in customising ESO helm release. Default value is {} to keep ESO standard deployment. Ignore the key if not required. | <pre>object({<br/> annotations = optional(object({<br/> # The annotations for external secret controller pods.<br/> external_secrets = optional(map(string), {})<br/> # The annotations for external secret cert controller pods.<br/> external_secrets_cert_controller = optional(map(string), {})<br/> # The annotations for external secret controller pods.<br/> external_secrets_webhook = optional(map(string), {})<br/> }), {})<br/><br/> labels = optional(object({<br/> # The labels for external secret controller pods.<br/> external_secrets = optional(map(string), {})<br/> # The labels for external secret cert controller pods.<br/> external_secrets_cert_controller = optional(map(string), {})<br/> # The labels for external secret controller pods.<br/> external_secrets_webhook = optional(map(string), {})<br/> }), {})<br/> })</pre> | `{}` | no |
524524
| <a name="input_existing_eso_namespace"></a> [existing\_eso\_namespace](#input\_existing\_eso\_namespace) | Existing Namespace to be used to install ESO components including helm releases. | `string` | `null` | no |

examples/all-combined/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ module "network_acl" {
186186
# OCP CLUSTER creation
187187
module "ocp_base" {
188188
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
189-
version = "3.73.2"
189+
version = "3.73.3"
190190
cluster_name = "${var.prefix}-vpc"
191191
resource_group_id = module.resource_group.resource_group_id
192192
region = var.region
@@ -231,7 +231,7 @@ data "ibm_cis" "cis_instance" {
231231

232232
module "vpes" {
233233
source = "terraform-ibm-modules/vpe-gateway/ibm"
234-
version = "4.8.4"
234+
version = "4.8.5"
235235
count = var.service_endpoints == "private" ? 1 : 0
236236
region = var.region
237237
prefix = "vpe"

examples/all-combined/privatecertificate.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ module "secrets_manager_private_secret_engine" {
3030
module "secrets_manager_private_certificate" {
3131
depends_on = [module.secrets_manager_private_secret_engine]
3232
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
33-
version = "1.8.1"
33+
version = "1.9.0"
3434
cert_name = "${var.prefix}-sm-private-cert"
3535
cert_description = "Private certificate for ${local.pvt_cert_common_name}"
3636
cert_secrets_group_id = module.secrets_manager_group.secret_group_id

examples/all-combined/publiccertificate.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
module "secrets_manager_public_cert_engine" {
99
count = (var.acme_letsencrypt_private_key != null || (var.acme_letsencrypt_private_key_sm_id != null && var.acme_letsencrypt_private_key_secret_id != null && var.acme_letsencrypt_private_key_sm_region != null)) ? 1 : 0
1010
source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
11-
version = "1.4.2"
11+
version = "1.6.0"
1212
secrets_manager_guid = local.sm_guid
1313
region = local.sm_region
1414
internet_services_crn = data.ibm_cis.cis_instance.id

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ module "network_acl" {
198198
# OCP CLUSTER creation
199199
module "ocp_base" {
200200
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
201-
version = "3.73.2"
201+
version = "3.73.3"
202202
cluster_name = "${var.prefix}-vpc"
203203
resource_group_id = module.resource_group.resource_group_id
204204
region = var.region

examples/trusted-profiles-authentication/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ module "external_secrets" {
166166

167167
module "vpes" {
168168
source = "terraform-ibm-modules/vpe-gateway/ibm"
169-
version = "4.8.4"
169+
version = "4.8.5"
170170
count = var.service_endpoints == "private" ? 1 : 0
171171
region = var.region
172172
prefix = "vpe"

solutions/fully-configurable/variables.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ variable "eso_image" {
146146
variable "eso_image_version" {
147147
type = string
148148
description = "The version or digest for the external secrets image to deploy. If changing the value, ensure it is compatible with the chart version set in eso_chart_version."
149-
default = "v1.0.0-ubi@sha256:b7a6c7ea483ca1aa1ee4199bc2708338f1385f5a22d7405068f1393d9d6b6dd5" # datasource: ghcr.io/external-secrets/external-secrets
149+
default = "v1.1.0-ubi@sha256:f27619afa57ca66cdde88ff46493cd114eb177a8f97414dcfa8a9394b959c741" # datasource: ghcr.io/external-secrets/external-secrets
150150
nullable = false
151151
validation {
152152
condition = can(regex("(^v\\d+\\.\\d+.\\d+(\\-\\w+)?(\\@sha256\\:\\w+){0,1})$", var.eso_image_version))
@@ -164,7 +164,7 @@ variable "eso_chart_location" {
164164
variable "eso_chart_version" {
165165
type = string
166166
description = "The version of the External Secrets Operator Helm chart. Ensure that the chart version is compatible with the image version specified in eso_image_version."
167-
default = "1.0.0" # registryUrl: charts.external-secrets.io
167+
default = "1.1.0" # registryUrl: charts.external-secrets.io
168168
nullable = false
169169
}
170170

tests/existing-resources/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ module "network_acl" {
184184
# OCP CLUSTER creation
185185
module "ocp_base" {
186186
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
187-
version = "3.73.2"
187+
version = "3.73.3"
188188
cluster_name = "${var.prefix}-vpc"
189189
resource_group_id = module.resource_group.resource_group_id
190190
region = var.region

tests/go.mod

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ go 1.24.0
55
toolchain go1.25.4
66

77
require (
8-
github.com/gruntwork-io/terratest v0.53.0
8+
github.com/gruntwork-io/terratest v0.54.0
99
github.com/stretchr/testify v1.11.1
10-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.29
10+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.32
1111
gopkg.in/yaml.v3 v3.0.1
1212
k8s.io/apimachinery v0.34.2
1313
)
@@ -157,9 +157,9 @@ require (
157157
go.opentelemetry.io/otel/trace v1.35.0 // indirect
158158
go.yaml.in/yaml/v2 v2.4.2 // indirect
159159
go.yaml.in/yaml/v3 v3.0.4 // indirect
160-
golang.org/x/crypto v0.44.0 // indirect
160+
golang.org/x/crypto v0.45.0 // indirect
161161
golang.org/x/mod v0.29.0 // indirect
162-
golang.org/x/net v0.46.0 // indirect
162+
golang.org/x/net v0.47.0 // indirect
163163
golang.org/x/oauth2 v0.27.0 // indirect
164164
golang.org/x/sync v0.18.0 // indirect
165165
golang.org/x/sys v0.38.0 // indirect

0 commit comments

Comments
 (0)