|
1 | 1 | # workaround for Schematics automatically setting a null value to false for bool type |
2 | 2 | # Issue for the enable_key_protect and enable_secrets_manager inputs as the logic fails with regard to |
3 | | -# determing whether to use the enable_secrets_manager or the toolchain specific counter parts ci/cd/cc_enable_secrets_manager |
| 3 | +# determining whether to use the enable_secrets_manager or the toolchain specific counter parts ci/cd/cc_enable_secrets_manager |
4 | 4 | # this could be addressed manually by ticking a setting in Schematics for each of the inputs |
5 | 5 | locals { |
6 | 6 |
|
@@ -332,7 +332,7 @@ module "prereqs" { |
332 | 332 | module "devsecops_ci_toolchain" { |
333 | 333 | count = var.create_ci_toolchain ? 1 : 0 |
334 | 334 | depends_on = [ibm_resource_instance.cd_instance] |
335 | | - source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-devsecops-ci-toolchain?ref=v2.7.0" |
| 335 | + source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-devsecops-ci-toolchain?ref=v2.7.1" |
336 | 336 | ibmcloud_api_key = var.ibmcloud_api_key |
337 | 337 | toolchain_name = (var.prefix == "") ? local.ci_toolchain_name : format("${var.prefix}-%s", local.ci_toolchain_name) |
338 | 338 | toolchain_region = (var.ci_toolchain_region == "") ? var.toolchain_region : replace(replace(var.ci_toolchain_region, "ibm:yp:", ""), "ibm:ys1:", "") |
@@ -460,6 +460,7 @@ module "devsecops_ci_toolchain" { |
460 | 460 | compliance_pipeline_existing_repo_url = var.compliance_pipeline_existing_repo_url |
461 | 461 | compliance_pipeline_source_repo_url = var.compliance_pipeline_source_repo_url |
462 | 462 | compliance_pipelines_repo_name = var.compliance_pipeline_repo_name |
| 463 | + compliance_pipelines_repo_is_private_repo = var.compliance_pipelines_repo_is_private_repo |
463 | 464 |
|
464 | 465 | #PIPELINE CONFIG REPO |
465 | 466 | pipeline_config_repo_existing_url = local.ci_pipeline_config_repo_existing_url |
@@ -720,6 +721,7 @@ module "devsecops_cd_toolchain" { |
720 | 721 | compliance_pipeline_existing_repo_url = var.compliance_pipeline_existing_repo_url |
721 | 722 | compliance_pipeline_source_repo_url = var.compliance_pipeline_source_repo_url |
722 | 723 | compliance_pipelines_repo_name = var.compliance_pipeline_repo_name |
| 724 | + compliance_pipelines_repo_is_private_repo = var.compliance_pipelines_repo_is_private_repo |
723 | 725 |
|
724 | 726 | #PIPELINE CONFIG REPO |
725 | 727 | pipeline_config_repo_existing_url = local.cd_pipeline_config_repo_existing_url |
@@ -996,6 +998,7 @@ module "devsecops_cc_toolchain" { |
996 | 998 | compliance_pipeline_existing_repo_url = var.compliance_pipeline_existing_repo_url |
997 | 999 | compliance_pipeline_source_repo_url = var.compliance_pipeline_source_repo_url |
998 | 1000 | compliance_pipelines_repo_name = var.compliance_pipeline_repo_name |
| 1001 | + compliance_pipelines_repo_is_private_repo = var.compliance_pipelines_repo_is_private_repo |
999 | 1002 |
|
1000 | 1003 | #PIPELINE CONFIG REPO |
1001 | 1004 | pipeline_config_repo_existing_url = local.cc_pipeline_config_repo_existing_url |
|
0 commit comments