Skip to content

Commit 681a75e

Browse files
fix(deps): update dependencies
1 parent 069a99b commit 681a75e

File tree

21 files changed

+209
-134
lines changed

21 files changed

+209
-134
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ on:
88

99
jobs:
1010
call-terraform-ci-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.22.4
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.23.2
1212
secrets: inherit
1313
with:
1414
craSCCv2: true

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.22.4
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.23.2
1212
secrets: inherit

.secrets.baseline

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2025-09-29T12:05:07Z",
6+
"generated_at": "2025-10-12T00:04:13Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -250,7 +250,7 @@
250250
}
251251
]
252252
},
253-
"version": "0.13.1+ibm.62.dss",
253+
"version": "0.13.1+ibm.64.dss",
254254
"word_list": {
255255
"file": null,
256256
"hash": null

examples/create_vpc/modules/landing_zone_vpc/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "create_vpc" {
22
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
3-
version = "7.23.6"
3+
version = "8.5.0"
44
prefix = local.prefix
55
region = local.region
66
tags = local.tags

modules/common/scripts/prepare_scale_inv_ini.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -966,7 +966,7 @@ def initialize_scale_ces_details(
966966
export_node_ip_map = [
967967
{protocol_cluster_instance_name.split(".")[0]: ip}
968968
for protocol_cluster_instance_name, ip in zip(
969-
protocol_cluster_instance_names, export_ip_pool
969+
protocol_cluster_instance_names, export_ip_pool, strict=False
970970
)
971971
]
972972

@@ -1638,7 +1638,7 @@ def initialize_scale_ces_details(
16381638
node_template = ""
16391639
for each_entry in node_details:
16401640
if ARGUMENTS.bastion_ssh_private_key is None:
1641-
each_entry = each_entry + " " + "ansible_ssh_common_args=" ""
1641+
each_entry = each_entry + " " + "ansible_ssh_common_args="
16421642
node_template = node_template + each_entry + "\n"
16431643
else:
16441644
proxy_command = f"ssh -p 22 -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -W %h:%p {ARGUMENTS.bastion_user}@{ARGUMENTS.bastion_ip} -i {ARGUMENTS.bastion_ssh_private_key}"

modules/dedicated_host/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "dedicated_host" {
66
source = "terraform-ibm-modules/dedicated-host/ibm"
7-
version = "1.1.0"
7+
version = "2.0.1"
88
dedicated_hosts = [
99
{
1010
host_group_name = "${var.prefix}-dhgroup"

modules/deployer/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ module "ssh_key" {
3737
module "bastion_sg" {
3838
count = var.enable_deployer && var.login_security_group_name == null ? 1 : 0
3939
source = "terraform-ibm-modules/security-group/ibm"
40-
version = "2.6.2"
40+
version = "2.8.0"
4141
add_ibm_cloud_internal_rules = true
4242
resource_group = var.resource_group
4343
security_group_name = format("%s-bastion-sg", local.prefix)
@@ -48,7 +48,7 @@ module "bastion_sg" {
4848
module "bastion_vsi" {
4949
count = (var.enable_deployer && var.bastion_instance_name == null) ? 1 : 0
5050
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
51-
version = "5.4.16"
51+
version = "5.11.0"
5252
vsi_per_subnet = 1
5353
create_security_group = false
5454
security_group = null
@@ -74,7 +74,7 @@ module "bastion_vsi" {
7474
module "deployer_vsi" {
7575
count = local.enable_deployer ? 1 : 0
7676
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
77-
version = "5.4.6"
77+
version = "5.11.0"
7878
vsi_per_subnet = 1
7979
create_security_group = false
8080
security_group = null

modules/landing_zone/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
module "landing_zone" {
22
count = var.enable_landing_zone ? 1 : 0
33
source = "terraform-ibm-modules/landing-zone/ibm"
4-
version = "8.4.3"
4+
version = "8.7.1"
55
prefix = local.prefix
66
region = local.region
77
tags = local.tags

modules/landing_zone_vsi/main.tf

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ module "storage_key" {
7979
module "client_sg" {
8080
count = local.enable_client && var.client_security_group_name == null ? 1 : 0
8181
source = "terraform-ibm-modules/security-group/ibm"
82-
version = "2.6.2"
82+
version = "2.8.0"
8383
add_ibm_cloud_internal_rules = true
8484
resource_group = var.resource_group
8585
security_group_name = format("%s-client-sg", local.prefix)
@@ -90,7 +90,7 @@ module "client_sg" {
9090
module "compute_sg" {
9191
count = local.enable_compute && var.compute_security_group_name == null ? 1 : 0
9292
source = "terraform-ibm-modules/security-group/ibm"
93-
version = "2.6.2"
93+
version = "2.8.0"
9494
add_ibm_cloud_internal_rules = true
9595
resource_group = var.resource_group
9696
security_group_name = format("%s-comp-sg", local.prefix)
@@ -101,7 +101,7 @@ module "compute_sg" {
101101
module "bastion_sg_existing" {
102102
count = var.login_security_group_name == null ? 1 : 0
103103
source = "terraform-ibm-modules/security-group/ibm"
104-
version = "2.6.2"
104+
version = "2.8.0"
105105
resource_group = var.resource_group
106106
add_ibm_cloud_internal_rules = false
107107
use_existing_security_group_id = true
@@ -113,7 +113,7 @@ module "bastion_sg_existing" {
113113
module "nfs_storage_sg" {
114114
count = var.storage_security_group_id != "" ? 1 : 0
115115
source = "terraform-ibm-modules/security-group/ibm"
116-
version = "2.6.2"
116+
version = "2.8.0"
117117
resource_group = var.resource_group
118118
add_ibm_cloud_internal_rules = true
119119
use_existing_security_group_id = true
@@ -125,7 +125,7 @@ module "nfs_storage_sg" {
125125
module "storage_sg" {
126126
count = local.enable_storage && var.storage_security_group_name == null ? 1 : 0
127127
source = "terraform-ibm-modules/security-group/ibm"
128-
version = "2.6.2"
128+
version = "2.8.0"
129129
add_ibm_cloud_internal_rules = true
130130
resource_group = var.resource_group
131131
security_group_name = format("%s-strg-sg", local.prefix)
@@ -136,7 +136,7 @@ module "storage_sg" {
136136
module "login_vsi" {
137137
count = var.scheduler == "LSF" ? 1 : 0
138138
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
139-
version = "5.4.6"
139+
version = "5.11.0"
140140
vsi_per_subnet = 1
141141
create_security_group = false
142142
security_group = null
@@ -161,7 +161,7 @@ module "login_vsi" {
161161
module "management_vsi" {
162162
count = length(var.management_instances)
163163
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
164-
version = "5.4.16"
164+
version = "5.11.0"
165165
vsi_per_subnet = var.management_instances[count.index]["count"]
166166
create_security_group = false
167167
security_group = null
@@ -185,7 +185,7 @@ module "management_vsi" {
185185
module "compute_vsi" {
186186
count = length(var.static_compute_instances)
187187
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
188-
version = "5.4.16"
188+
version = "5.11.0"
189189
vsi_per_subnet = var.static_compute_instances[count.index]["count"]
190190
create_security_group = false
191191
security_group = null
@@ -215,7 +215,7 @@ module "compute_vsi" {
215215
module "compute_cluster_management_vsi" {
216216
count = var.scheduler == "Scale" && local.enable_compute ? 1 : 0
217217
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
218-
version = "5.4.16"
218+
version = "5.11.0"
219219
vsi_per_subnet = 1
220220
create_security_group = false
221221
security_group = null
@@ -242,7 +242,7 @@ module "compute_cluster_management_vsi" {
242242
module "storage_vsi" {
243243
count = var.scheduler == "Scale" ? (length(var.storage_instances) > 0 && var.storage_type != "persistent" ? 1 : 0) : 0
244244
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
245-
version = "5.4.16"
245+
version = "5.11.0"
246246
vsi_per_subnet = var.storage_instances[count.index]["count"]
247247
create_security_group = false
248248
security_group = null
@@ -273,7 +273,7 @@ module "storage_vsi" {
273273
module "storage_cluster_management_vsi" {
274274
count = var.scheduler == "Scale" ? length(var.storage_instances) : 0
275275
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
276-
version = "5.4.16"
276+
version = "5.11.0"
277277
vsi_per_subnet = 1
278278
create_security_group = false
279279
security_group = null
@@ -301,7 +301,7 @@ module "storage_cluster_management_vsi" {
301301
module "storage_cluster_tie_breaker_vsi" {
302302
count = var.scheduler == "Scale" ? (var.storage_type != "persistent" ? 1 : 0) : 0
303303
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
304-
version = "5.4.16"
304+
version = "5.11.0"
305305
vsi_per_subnet = 1
306306
create_security_group = false
307307
security_group = null
@@ -330,7 +330,7 @@ module "storage_cluster_tie_breaker_vsi" {
330330
module "client_vsi" {
331331
count = var.scheduler == "Scale" ? length(var.client_instances) : 0
332332
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
333-
version = "5.4.6"
333+
version = "5.11.0"
334334
vsi_per_subnet = var.client_instances[count.index]["count"]
335335
create_security_group = false
336336
security_group = null
@@ -353,7 +353,7 @@ module "client_vsi" {
353353
module "protocol_vsi" {
354354
count = var.scheduler == "Scale" ? ((local.enable_protocol && var.colocate_protocol_instances == false && local.ces_server_type == false) ? 1 : 0) : 0
355355
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
356-
version = "5.4.16"
356+
version = "5.11.0"
357357
vsi_per_subnet = var.protocol_instances[count.index]["count"]
358358
create_security_group = false
359359
security_group = null
@@ -383,7 +383,7 @@ module "protocol_vsi" {
383383
module "afm_vsi" {
384384
count = var.scheduler == "Scale" ? ((local.afm_server_type == false && local.enable_afm) ? 1 : 0) : 0
385385
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
386-
version = "5.4.6"
386+
version = "5.11.0"
387387
vsi_per_subnet = var.afm_instances[count.index]["count"]
388388
create_security_group = false
389389
security_group = null
@@ -407,7 +407,7 @@ module "afm_vsi" {
407407
module "gklm_vsi" {
408408
count = var.scheduler == "Scale" ? (var.scale_encryption_enabled == true && var.scale_encryption_type == "gklm" ? 1 : 0) : 0
409409
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
410-
version = "5.4.6"
410+
version = "5.11.0"
411411
vsi_per_subnet = var.gklm_instances[count.index]["count"]
412412
create_security_group = false
413413
security_group = null
@@ -430,7 +430,7 @@ module "gklm_vsi" {
430430
module "ldap_vsi" {
431431
count = var.enable_ldap == true && var.ldap_server == "null" ? 1 : 0
432432
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
433-
version = "5.4.6"
433+
version = "5.11.0"
434434
vsi_per_subnet = 1
435435
create_security_group = false
436436
security_group = null

0 commit comments

Comments
 (0)