Skip to content

Commit f4233f6

Browse files
authored
ci: update tests, enable upgrade test (#519)
1 parent ab3d665 commit f4233f6

File tree

5 files changed

+16
-17
lines changed

5 files changed

+16
-17
lines changed

examples/default/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module "terraform_devsecops_alm" {
2-
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-devsecops-alm?ref=v2.3.0"
2+
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-devsecops-alm?ref=v2.5.0"
33
ibmcloud_api_key = var.ibmcloud_api_key
44
toolchain_resource_group = var.toolchain_resource_group
55
toolchain_region = var.toolchain_region

examples/devsecops-ci-toolchain-bring-your-own-app/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module "terraform_devsecops_alm" {
2-
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-devsecops-alm?ref=v2.3.0"
2+
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-devsecops-alm?ref=v2.5.0"
33
ibmcloud_api_key = var.ibmcloud_api_key
44
toolchain_resource_group = var.toolchain_resource_group
55
toolchain_region = var.toolchain_region

examples/devsecops-ci-toolchain-with-key-protect/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
module "terraform_devsecops_alm" {
2-
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-devsecops-alm?ref=v2.3.0"
2+
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-devsecops-alm?ref=v2.5.0"
33
ibmcloud_api_key = var.ibmcloud_api_key
44
toolchain_resource_group = var.toolchain_resource_group
55
toolchain_region = var.toolchain_region

tests/other_test.go

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,7 @@ func TestRunNonDefaultExample(t *testing.T) {
1818
TerraformDir: nonDefaultExampleTerraformDir,
1919
IgnoreUpdates: testhelper.Exemptions{ // Ignore for consistency check
2020
List: []string{
21-
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger",
22-
"module.terraform_devsecops_alm.module.devsecops_cd_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]",
23-
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]",
21+
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger[0]",
2422
},
2523
},
2624
TerraformVars: map[string]interface{}{

tests/pr_test.go

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,7 @@ func TestRunDefaultExample(t *testing.T) {
2222
TerraformDir: defaultExampleTerraformDir,
2323
IgnoreUpdates: testhelper.Exemptions{ // Ignore for consistency check
2424
List: []string{
25-
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger",
26-
"module.terraform_devsecops_alm.module.devsecops_cd_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]",
27-
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]",
25+
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger[0]",
2826
},
2927
},
3028
TerraformVars: map[string]interface{}{
@@ -46,9 +44,7 @@ func TestRunAppExample(t *testing.T) {
4644
TerraformDir: appExampleDir,
4745
IgnoreUpdates: testhelper.Exemptions{ // Ignore for consistency check
4846
List: []string{
49-
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger",
50-
"module.terraform_devsecops_alm.module.devsecops_cd_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]",
51-
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]",
47+
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger[0]",
5248
},
5349
},
5450
})
@@ -66,9 +62,7 @@ func TestRunKPExample(t *testing.T) {
6662
TerraformDir: kpExampleDir,
6763
IgnoreUpdates: testhelper.Exemptions{ // Ignore for consistency check
6864
List: []string{
69-
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger",
70-
"module.terraform_devsecops_alm.module.devsecops_cd_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]",
71-
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.integrations.ibm_cd_toolchain_tool_securitycompliance.scc_tool[0]",
65+
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger[0]",
7266
},
7367
},
7468
})
@@ -82,13 +76,20 @@ func TestRunUpgradeExample(t *testing.T) {
8276
t.Parallel()
8377

8478
// TODO: Remove this line after the first merge to primary branch is complete to enable upgrade test
85-
t.Skip("Skipping upgrade test until initial code is in primary branch")
79+
//t.Skip("Skipping upgrade test until initial code is in primary branch")
8680

8781
options := testhelper.TestOptionsDefault(&testhelper.TestOptions{
8882
Testing: t,
8983
TerraformDir: defaultExampleTerraformDir,
9084
IgnoreUpdates: testhelper.Exemptions{ // Ignore for consistency check
91-
List: []string{},
85+
List: []string{
86+
"module.terraform_devsecops_alm.module.devsecops_cc_toolchain[0].module.pipeline_cc.ibm_cd_tekton_pipeline_trigger.cc_pipeline_timed_trigger[0]",
87+
},
88+
},
89+
IgnoreDestroys: testhelper.Exemptions{ // Terraform resource created but unused. Needs to be destroyed. Can remove exemption in subsequent release.
90+
List: []string{
91+
"module.terraform_devsecops_alm.random_string.webhook_secret[0]",
92+
},
9293
},
9394
})
9495

0 commit comments

Comments
 (0)