@@ -22,9 +22,7 @@ func TestRunDefaultExample(t *testing.T) {
2222 TerraformDir : defaultExampleTerraformDir ,
2323 IgnoreUpdates : testhelper.Exemptions { // Ignore for consistency check
2424 List : []string {
25- "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger" ,
26- "module.terraform_devsecops_alm.module.devsecops_cd_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]" ,
27- "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]" ,
25+ "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger[0]" ,
2826 },
2927 },
3028 TerraformVars : map [string ]interface {}{
@@ -46,9 +44,7 @@ func TestRunAppExample(t *testing.T) {
4644 TerraformDir : appExampleDir ,
4745 IgnoreUpdates : testhelper.Exemptions { // Ignore for consistency check
4846 List : []string {
49- "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger" ,
50- "module.terraform_devsecops_alm.module.devsecops_cd_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]" ,
51- "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]" ,
47+ "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger[0]" ,
5248 },
5349 },
5450 })
@@ -66,9 +62,7 @@ func TestRunKPExample(t *testing.T) {
6662 TerraformDir : kpExampleDir ,
6763 IgnoreUpdates : testhelper.Exemptions { // Ignore for consistency check
6864 List : []string {
69- "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger" ,
70- "module.terraform_devsecops_alm.module.devsecops_cd_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]" ,
71- "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]" ,
65+ "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger[0]" ,
7266 },
7367 },
7468 })
@@ -82,13 +76,20 @@ func TestRunUpgradeExample(t *testing.T) {
8276 t .Parallel ()
8377
8478 // TODO: Remove this line after the first merge to primary branch is complete to enable upgrade test
85- t .Skip ("Skipping upgrade test until initial code is in primary branch" )
79+ // t.Skip("Skipping upgrade test until initial code is in primary branch")
8680
8781 options := testhelper .TestOptionsDefault (& testhelper.TestOptions {
8882 Testing : t ,
8983 TerraformDir : defaultExampleTerraformDir ,
9084 IgnoreUpdates : testhelper.Exemptions { // Ignore for consistency check
91- List : []string {},
85+ List : []string {
86+ "module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger[0]" ,
87+ },
88+ },
89+ IgnoreDestroys : testhelper.Exemptions { // Terraform resource created but unused. Needs to be destroyed. Can remove exemption in subsequent release.
90+ List : []string {
91+ "module.terraform_devsecops_alm.random_string.webhook_secret[0]" ,
92+ },
9293 },
9394 })
9495
0 commit comments