Skip to content

Commit 6ee9d4f

Browse files
author
Arya Girish K
committed
Merge remote-tracking branch 'origin/main' into 12391-issue
2 parents 305963b + 5f799c4 commit 6ee9d4f

File tree

12 files changed

+46
-28
lines changed

12 files changed

+46
-28
lines changed

README.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -517,22 +517,22 @@ module "es_kubernetes_secret" {
517517
| Name | Description | Type | Default | Required |
518518
|------|-------------|------|---------|:--------:|
519519
| <a name="input_eso_chart_location"></a> [eso\_chart\_location](#input\_eso\_chart\_location) | The location of the External Secrets Operator Helm chart. | `string` | `"https://charts.external-secrets.io"` | no |
520-
| <a name="input_eso_chart_version"></a> [eso\_chart\_version](#input\_eso\_chart\_version) | The version of the External Secrets Operator Helm chart. Ensure that the chart version is compatible with the image version specified in eso\_image\_version. | `string` | `"0.15.1"` | no |
520+
| <a name="input_eso_chart_version"></a> [eso\_chart\_version](#input\_eso\_chart\_version) | The version of the External Secrets Operator Helm chart. Ensure that the chart version is compatible with the image version specified in eso\_image\_version. | `string` | `"0.16.1"` | no |
521521
| <a name="input_eso_cluster_nodes_configuration"></a> [eso\_cluster\_nodes\_configuration](#input\_eso\_cluster\_nodes\_configuration) | Configuration to use to customise ESO deployment on specific cluster nodes. Setting appropriate values will result in customising ESO helm release. Default value is null to keep ESO standard deployment. | <pre>object({<br/> nodeSelector = object({<br/> label = string<br/> value = string<br/> })<br/> tolerations = object({<br/> key = string<br/> operator = string<br/> value = string<br/> effect = string<br/> })<br/> })</pre> | `null` | no |
522522
| <a name="input_eso_enroll_in_servicemesh"></a> [eso\_enroll\_in\_servicemesh](#input\_eso\_enroll\_in\_servicemesh) | Flag to enroll ESO into istio servicemesh | `bool` | `false` | no |
523523
| <a name="input_eso_image"></a> [eso\_image](#input\_eso\_image) | The External Secrets Operator image in the format of `[registry-url]/[namespace]/[image]`. | `string` | `"ghcr.io/external-secrets/external-secrets"` | no |
524-
| <a name="input_eso_image_version"></a> [eso\_image\_version](#input\_eso\_image\_version) | The version or digest for the external secrets image to deploy. If changing the value, ensure it is compatible with the chart version set in eso\_chart\_version. | `string` | `"v0.15.1-ubi@sha256:f9daa7f7072cddc71a1e23ea57574c9e90af65aa21f829d5ed1b092e7704f29f"` | no |
524+
| <a name="input_eso_image_version"></a> [eso\_image\_version](#input\_eso\_image\_version) | The version or digest for the external secrets image to deploy. If changing the value, ensure it is compatible with the chart version set in eso\_chart\_version. | `string` | `"v0.16.1-ubi@sha256:329ecbb3b0f1e70d9fa81a6de403325eae39ef95f89b1633cc3bc627ba3204b5"` | no |
525525
| <a name="input_eso_namespace"></a> [eso\_namespace](#input\_eso\_namespace) | Namespace to create and be used to install ESO components including helm releases. If eso\_store\_scope == cluster, this will also be used to deploy ClusterSecretStore/cluster\_store in it | `string` | `null` | no |
526526
| <a name="input_eso_pod_configuration"></a> [eso\_pod\_configuration](#input\_eso\_pod\_configuration) | Configuration to use to customise ESO deployment on specific pods. Setting appropriate values will result in customising ESO helm release. Default value is {} to keep ESO standard deployment. Ignore the key if not required. | <pre>object({<br/> annotations = optional(object({<br/> # The annotations for external secret controller pods.<br/> external_secrets = optional(map(string), {})<br/> # The annotations for external secret cert controller pods.<br/> external_secrets_cert_controller = optional(map(string), {})<br/> # The annotations for external secret controller pods.<br/> external_secrets_webhook = optional(map(string), {})<br/> }), {})<br/><br/> labels = optional(object({<br/> # The labels for external secret controller pods.<br/> external_secrets = optional(map(string), {})<br/> # The labels for external secret cert controller pods.<br/> external_secrets_cert_controller = optional(map(string), {})<br/> # The labels for external secret controller pods.<br/> external_secrets_webhook = optional(map(string), {})<br/> }), {})<br/> })</pre> | `{}` | no |
527527
| <a name="input_existing_eso_namespace"></a> [existing\_eso\_namespace](#input\_existing\_eso\_namespace) | Existing Namespace to be used to install ESO components including helm releases. If eso\_store\_scope == cluster, this will also be used to deploy ClusterSecretStore/cluster\_store in it | `string` | `null` | no |
528528
| <a name="input_reloader_chart_location"></a> [reloader\_chart\_location](#input\_reloader\_chart\_location) | The location of the Reloader Helm chart. | `string` | `"https://stakater.github.io/stakater-charts"` | no |
529-
| <a name="input_reloader_chart_version"></a> [reloader\_chart\_version](#input\_reloader\_chart\_version) | The version of the Reloader Helm chart. Ensure that the chart version is compatible with the image version specified in reloader\_image\_version. | `string` | `"2.0.0"` | no |
529+
| <a name="input_reloader_chart_version"></a> [reloader\_chart\_version](#input\_reloader\_chart\_version) | The version of the Reloader Helm chart. Ensure that the chart version is compatible with the image version specified in reloader\_image\_version. | `string` | `"2.1.2"` | no |
530530
| <a name="input_reloader_custom_values"></a> [reloader\_custom\_values](#input\_reloader\_custom\_values) | String containing custom values to be used for reloader helm chart. See https://github.com/stakater/Reloader/blob/master/deployments/kubernetes/chart/reloader/values.yaml | `string` | `null` | no |
531531
| <a name="input_reloader_deployed"></a> [reloader\_deployed](#input\_reloader\_deployed) | Whether to deploy reloader or not https://github.com/stakater/Reloader | `bool` | `true` | no |
532532
| <a name="input_reloader_ignore_configmaps"></a> [reloader\_ignore\_configmaps](#input\_reloader\_ignore\_configmaps) | Whether to ignore configmap changes or not | `bool` | `false` | no |
533533
| <a name="input_reloader_ignore_secrets"></a> [reloader\_ignore\_secrets](#input\_reloader\_ignore\_secrets) | Whether to ignore secret changes or not | `bool` | `false` | no |
534534
| <a name="input_reloader_image"></a> [reloader\_image](#input\_reloader\_image) | The reloader image repository in the format of `[registry-url]/[namespace]/[image]`. | `string` | `"ghcr.io/stakater/reloader"` | no |
535-
| <a name="input_reloader_image_version"></a> [reloader\_image\_version](#input\_reloader\_image\_version) | The version or digest for the reloader image to deploy. If changing the value, ensure it is compatible with the chart version set in reloader\_chart\_version. | `string` | `"v1.4.0-ubi@sha256:a7fada97d29ef3e13816086a8aeaeefd8c55a02c74558072304929230c81d4ac"` | no |
535+
| <a name="input_reloader_image_version"></a> [reloader\_image\_version](#input\_reloader\_image\_version) | The version or digest for the reloader image to deploy. If changing the value, ensure it is compatible with the chart version set in reloader\_chart\_version. | `string` | `"v1.4.1-ubi@sha256:aff89a3997ad1f749f6ab776d37ea6cfeabf6d179740044bfe337be055f83c5b"` | no |
536536
| <a name="input_reloader_is_argo_rollouts"></a> [reloader\_is\_argo\_rollouts](#input\_reloader\_is\_argo\_rollouts) | Enable Argo Rollouts | `bool` | `false` | no |
537537
| <a name="input_reloader_is_openshift"></a> [reloader\_is\_openshift](#input\_reloader\_is\_openshift) | Enable OpenShift DeploymentConfigs | `bool` | `true` | no |
538538
| <a name="input_reloader_log_format"></a> [reloader\_log\_format](#input\_reloader\_log\_format) | The log format to use for reloader. Possible values are `json` or `text`. Default value is `json` | `string` | `"text"` | no |

examples/all-combined/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ module "network_acl" {
186186
# OCP CLUSTER creation
187187
module "ocp_base" {
188188
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
189-
version = "3.46.6"
189+
version = "3.46.11"
190190
cluster_name = "${var.prefix}-vpc"
191191
resource_group_id = module.resource_group.resource_group_id
192192
region = var.region

examples/all-combined/secretsmanager.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ resource "ibm_resource_instance" "secrets_manager" {
3636
# create secrets group for secrets
3737
module "secrets_manager_group" {
3838
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
39-
version = "1.3.2"
39+
version = "1.3.3"
4040
region = local.sm_region
4141
secrets_manager_guid = local.sm_guid
4242
secret_group_name = "${var.prefix}-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -49,7 +49,7 @@ module "secrets_manager_group" {
4949
# additional secrets manager secret group for service level secrets
5050
module "secrets_manager_group_acct" {
5151
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
52-
version = "1.3.2"
52+
version = "1.3.3"
5353
region = local.sm_region
5454
secrets_manager_guid = local.sm_guid
5555
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/all-combined/tpauth_cluster_sstore.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# creating a secrets group for clustersecretstore with trustedprofile auth
88
module "tp_clusterstore_secrets_manager_group" {
99
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
10-
version = "1.3.2"
10+
version = "1.3.3"
1111
region = local.sm_region
1212
secrets_manager_guid = local.sm_guid
1313
secret_group_name = "${var.prefix}-cpstore-tp-secret-group" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/all-combined/tpauth_namespaced_sstore.tf

+4-4
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ module "eso_tp_namespace_secretstores" {
4040
# creating a secrets group for each namespace to be used for namespaced secretstores with trustedprofile auth
4141
module "tp_secrets_manager_groups" {
4242
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
43-
version = "1.3.2"
43+
version = "1.3.3"
4444
count = length(var.es_namespaces_tp)
4545
region = local.sm_region
4646
secrets_manager_guid = local.sm_guid
@@ -140,7 +140,7 @@ module "eso_tp_namespace_secretstore_multisg" {
140140
# creating two secrets groups for a single namespace to test trusted profile policy on multiple secrets groups
141141
module "tp_secrets_manager_group_multi_1" {
142142
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
143-
version = "1.3.2"
143+
version = "1.3.3"
144144
region = local.sm_region
145145
secrets_manager_guid = local.sm_guid
146146
secret_group_name = "${var.prefix}-tp-secret-group-multisg-1" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -152,7 +152,7 @@ module "tp_secrets_manager_group_multi_1" {
152152

153153
module "tp_secrets_manager_group_multi_2" {
154154
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
155-
version = "1.3.2"
155+
version = "1.3.3"
156156
region = local.sm_region
157157
secrets_manager_guid = local.sm_guid
158158
secret_group_name = "${var.prefix}-tp-secret-group-multisg-21" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
@@ -285,7 +285,7 @@ module "eso_tp_namespace_secretstore_nosecgroup" {
285285
# creating secrets group for a single namespace to test trusted profile policy without any secret group in the TP policy
286286
module "tp_secrets_manager_group_not_for_policy" {
287287
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
288-
version = "1.3.2"
288+
version = "1.3.3"
289289
region = local.sm_region
290290
secrets_manager_guid = local.sm_guid
291291
secret_group_name = "${var.prefix}-tp-secret-group-not-for-policy" #checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value

examples/basic/main.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ module "network_acl" {
198198
# OCP CLUSTER creation
199199
module "ocp_base" {
200200
source = "terraform-ibm-modules/base-ocp-vpc/ibm"
201-
version = "3.46.6"
201+
version = "3.46.11"
202202
cluster_name = "${var.prefix}-vpc"
203203
resource_group_id = module.resource_group.resource_group_id
204204
region = var.region
@@ -267,7 +267,7 @@ resource "ibm_resource_instance" "secrets_manager" {
267267
# Additional Secrets-Manager Secret-Group for SERVICE level secrets
268268
module "secrets_manager_group_acct" {
269269
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
270-
version = "1.3.2"
270+
version = "1.3.3"
271271
region = local.sm_region
272272
secrets_manager_guid = local.sm_guid
273273
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/trusted-profiles-authentication/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ resource "ibm_resource_instance" "secrets_manager" {
4141

4242
module "secrets_manager_groups" {
4343
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
44-
version = "1.3.2"
44+
version = "1.3.3"
4545
count = length(kubernetes_namespace.examples)
4646
region = local.sm_region
4747
secrets_manager_guid = local.sm_guid

modules/eso-external-secret/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ No modules.
3838
|------|-------------|------|---------|:--------:|
3939
| <a name="input_es_container_registry"></a> [es\_container\_registry](#input\_es\_container\_registry) | The registry URL to be used in dockerconfigjson | `string` | `"us.icr.io"` | no |
4040
| <a name="input_es_container_registry_email"></a> [es\_container\_registry\_email](#input\_es\_container\_registry\_email) | Optional - Email to be used in dockerconfigjson | `string` | `null` | no |
41-
| <a name="input_es_container_registry_secrets_chain"></a> [es\_container\_registry\_secrets\_chain](#input\_es\_container\_registry\_secrets\_chain) | Structure to generate a chain of secrets into a single dockerjsonconfig secret for multiple registries authentication. | <pre>list(object({<br/> es_container_registry = string<br/> sm_secret_id = string # id of the secret storing the apikey that will be used for the secrets chain<br/> es_container_registry_email = optional(string, null)<br/> }))</pre> | `[]` | no |
41+
| <a name="input_es_container_registry_secrets_chain"></a> [es\_container\_registry\_secrets\_chain](#input\_es\_container\_registry\_secrets\_chain) | Structure to generate a chain of secrets into a single dockerjsonconfig secret for multiple registries authentication. | <pre>list(object({<br/> es_container_registry = string<br/> sm_secret_id = string # id of the secret storing the apikey that will be used for the secrets chain<br/> es_container_registry_email = optional(string, null)<br/> trusted_profile = optional(string, null)<br/> }))</pre> | `[]` | no |
4242
| <a name="input_es_helm_rls_name"></a> [es\_helm\_rls\_name](#input\_es\_helm\_rls\_name) | Name to use for the helm release for externalsecrets resource. Must be unique in the namespace | `string` | n/a | yes |
4343
| <a name="input_es_helm_rls_namespace"></a> [es\_helm\_rls\_namespace](#input\_es\_helm\_rls\_namespace) | Namespace to deploy the helm release for the externalsecret. Default if null is the externalsecret namespace | `string` | `null` | no |
4444
| <a name="input_es_kubernetes_namespace"></a> [es\_kubernetes\_namespace](#input\_es\_kubernetes\_namespace) | Namespace to use to generate the externalsecret | `string` | n/a | yes |
@@ -54,7 +54,7 @@ No modules.
5454
| <a name="input_sm_kv_keyid"></a> [sm\_kv\_keyid](#input\_sm\_kv\_keyid) | Secrets-Manager key value (kv) keyid | `string` | `null` | no |
5555
| <a name="input_sm_kv_keypath"></a> [sm\_kv\_keypath](#input\_sm\_kv\_keypath) | Secrets-Manager key value (kv) keypath | `string` | `null` | no |
5656
| <a name="input_sm_secret_id"></a> [sm\_secret\_id](#input\_sm\_secret\_id) | Secrets-Manager secret ID where source data will be synchronized with Kubernetes secret. It can be null only in the case of a dockerjsonconfig secrets chain | `string` | n/a | yes |
57-
| <a name="input_sm_secret_type"></a> [sm\_secret\_type](#input\_sm\_secret\_type) | Secrets-manager secret type to be used as source data by ESO. Valid input types are 'arbitrary', 'username\_password' and 'iam\_credentials' | `string` | n/a | yes |
57+
| <a name="input_sm_secret_type"></a> [sm\_secret\_type](#input\_sm\_secret\_type) | Secrets-manager secret type to be used as source data by ESO. Valid input types are 'iam\_credentials', 'username\_password', 'trusted\_profile', 'arbitrary', 'imported\_cert', 'public\_cert', 'private\_cert', 'kv' | `string` | n/a | yes |
5858

5959
### Outputs
6060

0 commit comments

Comments
 (0)