Skip to content

Commit f95eea6

Browse files
fix(deps): update dependencies
1 parent 3d0cb88 commit f95eea6

File tree

22 files changed

+204
-166
lines changed

22 files changed

+204
-166
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ on:
88

99
jobs:
1010
call-terraform-ci-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.22.4
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.23.2
1212
secrets: inherit
1313
with:
1414
craSCCv2: true

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.22.4
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.23.2
1212
secrets: inherit

.secrets.baseline

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2025-06-19T07:38:57Z",
6+
"generated_at": "2025-10-25T04:35:48Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -104,7 +104,7 @@
104104
}
105105
]
106106
},
107-
"version": "0.13.1+ibm.62.dss",
107+
"version": "0.13.1+ibm.64.dss",
108108
"word_list": {
109109
"file": null,
110110
"hash": null

examples/create_vpc/modules/landing_zone_vpc/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "create_vpc" {
22
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
3-
version = "7.23.6"
3+
version = "8.7.0"
44
prefix = local.prefix
55
region = local.region
66
tags = local.tags

modules/baremetal/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ module "storage_key" {
55

66
module "storage_baremetal" {
77
source = "terraform-ibm-modules/bare-metal-vpc/ibm"
8-
version = "1.1.0"
8+
version = "1.3.0"
99
count = length(var.storage_servers)
1010
server_count = var.storage_servers[count.index]["count"]
1111
prefix = count.index == 0 ? local.storage_node_name : format("%s-%s", local.storage_node_name, count.index)

modules/common/scripts/prepare_scale_inv_ini.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -949,7 +949,7 @@ def initialize_scale_ces_details(
949949
export_node_ip_map = [
950950
{protocol_cluster_instance_name.split(".")[0]: ip}
951951
for protocol_cluster_instance_name, ip in zip(
952-
protocol_cluster_instance_names, export_ip_pool
952+
protocol_cluster_instance_names, export_ip_pool, strict=False
953953
)
954954
]
955955

@@ -1596,7 +1596,7 @@ def initialize_scale_ces_details(
15961596
node_template = ""
15971597
for each_entry in node_details:
15981598
if ARGUMENTS.bastion_ssh_private_key is None:
1599-
each_entry = each_entry + " " + "ansible_ssh_common_args=" ""
1599+
each_entry = each_entry + " " + "ansible_ssh_common_args="
16001600
node_template = node_template + each_entry + "\n"
16011601
else:
16021602
proxy_command = f"ssh -p 22 -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -W %h:%p {ARGUMENTS.bastion_user}@{ARGUMENTS.bastion_ip} -i {ARGUMENTS.bastion_ssh_private_key}"

modules/dedicated_host/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "dedicated_host" {
66
source = "terraform-ibm-modules/dedicated-host/ibm"
7-
version = "1.1.0"
7+
version = "2.0.1"
88
dedicated_hosts = [
99
{
1010
host_group_name = "${var.prefix}-dhgroup"

modules/deployer/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ module "ssh_key" {
1919
module "bastion_sg" {
2020
count = var.enable_deployer ? 1 : 0
2121
source = "terraform-ibm-modules/security-group/ibm"
22-
version = "2.6.2"
22+
version = "2.8.0"
2323
add_ibm_cloud_internal_rules = true
2424
resource_group = var.resource_group
2525
security_group_name = format("%s-bastion-sg", local.prefix)
@@ -30,7 +30,7 @@ module "bastion_sg" {
3030
module "bastion_vsi" {
3131
count = (var.enable_deployer && var.bastion_instance_name == null) ? 1 : 0
3232
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
33-
version = "5.0.0"
33+
version = "5.14.0"
3434
vsi_per_subnet = 1
3535
create_security_group = false
3636
security_group = null
@@ -54,7 +54,7 @@ module "bastion_vsi" {
5454
module "deployer_vsi" {
5555
count = local.enable_deployer ? 1 : 0
5656
source = "terraform-ibm-modules/landing-zone-vsi/ibm"
57-
version = "5.0.0"
57+
version = "5.14.0"
5858
vsi_per_subnet = 1
5959
create_security_group = false
6060
security_group = null

modules/landing_zone/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
module "landing_zone" {
22
count = var.enable_landing_zone ? 1 : 0
33
source = "terraform-ibm-modules/landing-zone/ibm"
4-
version = "8.2.0"
4+
version = "8.8.0"
55
prefix = local.prefix
66
region = local.region
77
tags = local.tags

0 commit comments

Comments
 (0)