Skip to content

Commit ae4b7e4

Browse files
committed
ci: update catalog
1 parent e007afd commit ae4b7e4

File tree

2 files changed

+7
-4
lines changed

2 files changed

+7
-4
lines changed

.secrets.baseline

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2023-10-25T21:08:16Z",
6+
"generated_at": "2023-10-26T08:49:47Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -82,7 +82,7 @@
8282
"hashed_secret": "02095e83532ae9dcc9dfd7cb12efa0891db66278",
8383
"is_secret": false,
8484
"is_verified": false,
85-
"line_number": 3026,
85+
"line_number": 3029,
8686
"type": "Secret Keyword",
8787
"verified_result": null
8888
}

ibm_catalog.json

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@
2626
"flavors": [
2727
{
2828
"usage": "ibmcloud_api_key = \"\" #Set your API key\nci_toolchain_name = \"DevSecOps CI Toolchain - Terraform\"\ncd_toolchain_name = \"DevSecOps CD Toolchain - Terraform\"\ncc_toolchain_name = \"DevSecOps CC Toolchain - Terraform\"\ntoolchain_resource_group = \"Default\"\ntoolchain_region = \"jp-tok\" #Region short name only\nci_registry_namespace = \"tektonhh\"\nci_registry_region = \"ibm:yp:jp-tok\"\nsm_name = \"sm-compliance-secrets\" #Secrets Manager instance name\nsm_location = \"eu-gb\"\nsm_resource_group = \"Default\"\nsm_secret_group = \"Default\"\nci_cluster_name = \"mycluster-free\"\nci_cluster_namespace = \"dev\"\nci_dev_region = \"ibm:yp:jp-tok\"\nci_dev_resource_group = \"Default\"\ncd_cluster_name = \"mycluster-free\"\ncd_cluster_namespace = \"prod\"",
29+
"label": "DevSecOps",
30+
"name": "devsecops",
31+
"working_directory": "./",
2932
"compliance": {
3033
"authority": "scc-v3",
3134
"controls": [
@@ -3025,7 +3028,7 @@
30253028
{
30263029
"usage": "ibmcloud_api_key = \"\" #Set your API key\nci_toolchain_name = \"DevSecOps CI Toolchain - Terraform\"\ncd_toolchain_name = \"DevSecOps CD Toolchain - Terraform\"\ncc_toolchain_name = \"DevSecOps CC Toolchain - Terraform\"\ntoolchain_resource_group = \"Default\"\ntoolchain_region = \"jp-tok\" #Region short name only\nci_registry_namespace = \"tektonhh\"\nci_registry_region = \"ibm:yp:jp-tok\"\nsm_name = \"sm-compliance-secrets\" #Secrets Manager instance name\nsm_location = \"eu-gb\"\nsm_resource_group = \"Default\"\nsm_secret_group = \"Default\"\nci_cluster_name = \"mycluster-free\"\nci_cluster_namespace = \"dev\"\nci_dev_region = \"ibm:yp:jp-tok\"\nci_dev_resource_group = \"Default\"\ncd_cluster_name = \"mycluster-free\"\ncd_cluster_namespace = \"prod\"",
30273030
"label": "DevSecOps Code Engine",
3028-
"name": "devsecops_ce",
3031+
"name": "devsecopsce",
30293032
"working_directory": "code-engine",
30303033
"compliance": {
30313034
"authority": "scc-v3",
@@ -3538,7 +3541,7 @@
35383541
"type": "string",
35393542
"default_value": "mycluster-free",
35403543
"description": "Name of the Kubernetes cluster where the application is deployed. This sets the same cluster for both CI and CD toolchains. See `ci_cluster_name` and `cd_cluster_name` to set different clusters. By default , the cluster namespace for CI will be set to `dev` and CD to `prod`. These can be changed using `ci_cluster_namespace` and `cd_cluster_namespace`.",
3541-
"required": true
3544+
"required": false
35423545
},
35433546
{
35443547
"key": "authorization_policy_creation",

0 commit comments

Comments
 (0)