Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,5 +14,5 @@ on:

jobs:
call-terraform-ci-pipeline:
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.24.4
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.24.6
secrets: inherit
2 changes: 1 addition & 1 deletion .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,5 +12,5 @@ on:

jobs:
call-terraform-release-pipeline:
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.24.4
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.24.6
secrets: inherit
14 changes: 7 additions & 7 deletions modules/powervs-vpc-landing-zone/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -109,17 +109,17 @@ Creates VPC Landing Zone | Performs VPC VSI OS Config | Creates PowerVS Infrastr

| Name | Source | Version |
|------|--------|---------|
| <a name="module_app_config"></a> [app\_config](#module\_app\_config) | terraform-ibm-modules/app-configuration/ibm | 1.15.16 |
| <a name="module_client_to_site_vpn"></a> [client\_to\_site\_vpn](#module\_client\_to\_site\_vpn) | terraform-ibm-modules/client-to-site-vpn/ibm | 3.5.8 |
| <a name="module_app_config"></a> [app\_config](#module\_app\_config) | terraform-ibm-modules/app-configuration/ibm | 1.16.1 |
| <a name="module_client_to_site_vpn"></a> [client\_to\_site\_vpn](#module\_client\_to\_site\_vpn) | terraform-ibm-modules/client-to-site-vpn/ibm | 3.5.9 |
| <a name="module_configure_monitoring_host"></a> [configure\_monitoring\_host](#module\_configure\_monitoring\_host) | ./submodules/ansible | n/a |
| <a name="module_configure_network_services"></a> [configure\_network\_services](#module\_configure\_network\_services) | ./submodules/ansible | n/a |
| <a name="module_configure_scc_wp_agent"></a> [configure\_scc\_wp\_agent](#module\_configure\_scc\_wp\_agent) | ./submodules/ansible | n/a |
| <a name="module_landing_zone"></a> [landing\_zone](#module\_landing\_zone) | terraform-ibm-modules/landing-zone/ibm//patterns//vsi//module | 8.15.11 |
| <a name="module_landing_zone"></a> [landing\_zone](#module\_landing\_zone) | terraform-ibm-modules/landing-zone/ibm//patterns//vsi//module | 8.15.13 |
| <a name="module_powervs_workspace"></a> [powervs\_workspace](#module\_powervs\_workspace) | terraform-ibm-modules/powervs-workspace/ibm | 4.3.0 |
| <a name="module_private_secret_engine"></a> [private\_secret\_engine](#module\_private\_secret\_engine) | terraform-ibm-modules/secrets-manager-private-cert-engine/ibm | 1.13.5 |
| <a name="module_scc_wp_instance"></a> [scc\_wp\_instance](#module\_scc\_wp\_instance) | terraform-ibm-modules/scc-workload-protection/ibm | 1.18.0 |
| <a name="module_secrets_manager_group"></a> [secrets\_manager\_group](#module\_secrets\_manager\_group) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.4.8 |
| <a name="module_secrets_manager_private_certificate"></a> [secrets\_manager\_private\_certificate](#module\_secrets\_manager\_private\_certificate) | terraform-ibm-modules/secrets-manager-private-cert/ibm | 1.11.5 |
| <a name="module_private_secret_engine"></a> [private\_secret\_engine](#module\_private\_secret\_engine) | terraform-ibm-modules/secrets-manager-private-cert-engine/ibm | 1.14.0 |
| <a name="module_scc_wp_instance"></a> [scc\_wp\_instance](#module\_scc\_wp\_instance) | terraform-ibm-modules/scc-workload-protection/ibm | 1.18.2 |
| <a name="module_secrets_manager_group"></a> [secrets\_manager\_group](#module\_secrets\_manager\_group) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.5.0 |
| <a name="module_secrets_manager_private_certificate"></a> [secrets\_manager\_private\_certificate](#module\_secrets\_manager\_private\_certificate) | terraform-ibm-modules/secrets-manager-private-cert/ibm | 1.12.0 |

### Resources

Expand Down
8 changes: 4 additions & 4 deletions modules/powervs-vpc-landing-zone/client2sitevpn.tf
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ resource "ibm_resource_instance" "secrets_manager" {
# Configure private cert engine if provisioning a new SM instance
module "private_secret_engine" {
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
version = "1.13.5"
version = "1.14.0"
providers = { ibm = ibm.ibm-sm }
count = var.client_to_site_vpn.enable ? 1 : 0
depends_on = [ibm_resource_instance.secrets_manager]
Expand All @@ -108,7 +108,7 @@ module "private_secret_engine" {
# Create a secret group to place the certificate in
module "secrets_manager_group" {
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
version = "1.4.8"
version = "1.5.0"
providers = { ibm = ibm.ibm-sm }
count = var.client_to_site_vpn.enable ? 1 : 0

Expand All @@ -122,7 +122,7 @@ module "secrets_manager_group" {
# Create private cert to use for VPN server
module "secrets_manager_private_certificate" {
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
version = "1.11.5"
version = "1.12.0"
providers = { ibm = ibm.ibm-sm }
count = var.client_to_site_vpn.enable ? 1 : 0
depends_on = [module.private_secret_engine]
Expand All @@ -141,7 +141,7 @@ module "secrets_manager_private_certificate" {
# Create client to site VPN Server
module "client_to_site_vpn" {
source = "terraform-ibm-modules/client-to-site-vpn/ibm"
version = "3.5.8"
version = "3.5.9"
providers = { ibm = ibm.ibm-is }
count = var.client_to_site_vpn.enable ? 1 : 0

Expand Down
2 changes: 1 addition & 1 deletion modules/powervs-vpc-landing-zone/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ EOT

module "landing_zone" {
source = "terraform-ibm-modules/landing-zone/ibm//patterns//vsi//module"
version = "8.15.11"
version = "8.15.13"
providers = { ibm = ibm.ibm-is }

ssh_public_key = var.ssh_public_key
Expand Down
4 changes: 2 additions & 2 deletions modules/powervs-vpc-landing-zone/scc-wp.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
# Create new App Config instance
module "app_config" {
source = "terraform-ibm-modules/app-configuration/ibm"
version = "1.15.16"
version = "1.16.1"
providers = { ibm = ibm.ibm-is }
count = var.enable_scc_wp ? 1 : 0

Expand All @@ -20,7 +20,7 @@ module "app_config" {

module "scc_wp_instance" {
source = "terraform-ibm-modules/scc-workload-protection/ibm"
version = "1.18.0"
version = "1.18.2"
providers = { ibm = ibm.ibm-is }
count = var.enable_scc_wp ? 1 : 0

Expand Down
6 changes: 3 additions & 3 deletions solutions/standard-openshift/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,8 +50,8 @@ Due to technical limitations, the cost estimate Projects gives does not include
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.9 |
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | 1.89.0 |
| <a name="requirement_restapi"></a> [restapi](#requirement\_restapi) | 2.0.1 |
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | 2.0.0 |
| <a name="requirement_restapi"></a> [restapi](#requirement\_restapi) | 3.0.0 |

### Modules

Expand All @@ -67,7 +67,7 @@ Due to technical limitations, the cost estimate Projects gives does not include

| Name | Type |
|------|------|
| [ibm_iam_auth_token.auth_token](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.89.0/docs/data-sources/iam_auth_token) | data source |
| [ibm_iam_auth_token.auth_token](https://registry.terraform.io/providers/IBM-Cloud/ibm/2.0.0/docs/data-sources/iam_auth_token) | data source |

### Inputs

Expand Down
4 changes: 2 additions & 2 deletions solutions/standard-openshift/versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,11 @@ terraform {
required_providers {
ibm = {
source = "IBM-Cloud/ibm"
version = "1.89.0"
version = "2.0.0"
}
restapi = {
source = "Mastercard/restapi"
version = "2.0.1"
version = "3.0.0"
}
}
}
6 changes: 3 additions & 3 deletions solutions/standard-plus-vsi/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,8 +48,8 @@ This example sets up the following infrastructure:
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.9 |
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | 1.89.0 |
| <a name="requirement_restapi"></a> [restapi](#requirement\_restapi) | 2.0.1 |
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | 2.0.0 |
| <a name="requirement_restapi"></a> [restapi](#requirement\_restapi) | 3.0.0 |

### Modules

Expand All @@ -64,7 +64,7 @@ This example sets up the following infrastructure:

| Name | Type |
|------|------|
| [ibm_iam_auth_token.auth_token](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.89.0/docs/data-sources/iam_auth_token) | data source |
| [ibm_iam_auth_token.auth_token](https://registry.terraform.io/providers/IBM-Cloud/ibm/2.0.0/docs/data-sources/iam_auth_token) | data source |

### Inputs

Expand Down
4 changes: 2 additions & 2 deletions solutions/standard-plus-vsi/versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,11 @@ terraform {
required_providers {
ibm = {
source = "IBM-Cloud/ibm"
version = "1.89.0"
version = "2.0.0"
}
restapi = {
source = "Mastercard/restapi"
version = "2.0.1"
version = "3.0.0"
}
}
}
6 changes: 3 additions & 3 deletions solutions/standard/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,8 +47,8 @@ This example sets up the following infrastructure:
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.9 |
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | 1.89.0 |
| <a name="requirement_restapi"></a> [restapi](#requirement\_restapi) | 2.0.1 |
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | 2.0.0 |
| <a name="requirement_restapi"></a> [restapi](#requirement\_restapi) | 3.0.0 |

### Modules

Expand All @@ -60,7 +60,7 @@ This example sets up the following infrastructure:

| Name | Type |
|------|------|
| [ibm_iam_auth_token.auth_token](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.89.0/docs/data-sources/iam_auth_token) | data source |
| [ibm_iam_auth_token.auth_token](https://registry.terraform.io/providers/IBM-Cloud/ibm/2.0.0/docs/data-sources/iam_auth_token) | data source |

### Inputs

Expand Down
4 changes: 2 additions & 2 deletions solutions/standard/versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,11 @@ terraform {
required_providers {
ibm = {
source = "IBM-Cloud/ibm"
version = "1.89.0"
version = "2.0.0"
}
restapi = {
source = "Mastercard/restapi"
version = "2.0.1"
version = "3.0.0"
}
}
}
20 changes: 10 additions & 10 deletions tests/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ go 1.26.1
require (
github.com/gruntwork-io/terratest v0.56.0
github.com/stretchr/testify v1.11.1
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.69.7
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.70.2
)

require (
Expand All @@ -14,7 +14,7 @@ require (
github.com/IBM-Cloud/power-go-client v1.15.0 // indirect
github.com/IBM/cloud-databases-go-sdk v0.8.1 // indirect
github.com/IBM/go-sdk-core/v5 v5.21.2 // indirect
github.com/IBM/platform-services-go-sdk v0.96.0 // indirect
github.com/IBM/platform-services-go-sdk v0.97.1 // indirect
github.com/IBM/project-go-sdk v0.4.0 // indirect
github.com/IBM/schematics-go-sdk v0.4.0 // indirect
github.com/IBM/vpc-go-sdk v1.0.2 // indirect
Expand All @@ -23,15 +23,15 @@ require (
github.com/agext/levenshtein v1.2.3 // indirect
github.com/apparentlymart/go-textseg/v15 v15.0.0 // indirect
github.com/bgentry/go-netrc v0.0.0-20140422174119-9fd32a8b3d3d // indirect
github.com/cloudflare/circl v1.6.1 // indirect
github.com/cloudflare/circl v1.6.3 // indirect
github.com/cyphar/filepath-securejoin v0.4.1 // indirect
github.com/davecgh/go-spew v1.1.1 // indirect
github.com/emirpasic/gods v1.18.1 // indirect
github.com/gabriel-vasile/mimetype v1.4.11 // indirect
github.com/ghodss/yaml v1.0.0 // indirect
github.com/go-git/gcfg v1.5.1-0.20230307220236-3a3c6141e376 // indirect
github.com/go-git/go-billy/v5 v5.8.0 // indirect
github.com/go-git/go-git/v5 v5.17.0 // indirect
github.com/go-git/go-git/v5 v5.17.2 // indirect
github.com/go-logr/logr v1.4.3 // indirect
github.com/go-logr/stdr v1.2.2 // indirect
github.com/go-openapi/analysis v0.23.0 // indirect
Expand Down Expand Up @@ -87,13 +87,13 @@ require (
go.opentelemetry.io/otel/metric v1.35.0 // indirect
go.opentelemetry.io/otel/trace v1.35.0 // indirect
go.yaml.in/yaml/v2 v2.4.3 // indirect
golang.org/x/crypto v0.49.0 // indirect
golang.org/x/mod v0.33.0 // indirect
golang.org/x/net v0.51.0 // indirect
golang.org/x/crypto v0.50.0 // indirect
golang.org/x/mod v0.34.0 // indirect
golang.org/x/net v0.52.0 // indirect
golang.org/x/sync v0.20.0 // indirect
golang.org/x/sys v0.42.0 // indirect
golang.org/x/text v0.35.0 // indirect
golang.org/x/tools v0.42.0 // indirect
golang.org/x/sys v0.43.0 // indirect
golang.org/x/text v0.36.0 // indirect
golang.org/x/tools v0.43.0 // indirect
gopkg.in/warnings.v0 v0.1.2 // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
Expand Down
Loading