diff --git a/cra-config.yaml b/cra-config.yaml deleted file mode 100644 index 252ce2b..0000000 --- a/cra-config.yaml +++ /dev/null @@ -1,21 +0,0 @@ -# -# Developer tips: -# - CRA = Code Risk Analyzer (more info on CRA: https://cloud.ibm.com/docs/code-risk-analyzer-cli-plugin?topic=code-risk-analyzer-cli-plugin-cra-cli-plugin) -# - Multiple directories can be scanned by CRA. Ensure if there are any deployable architecture in the repository that they are all scanned -# - More info about supported configurations at https://github.com/terraform-ibm-modules/common-pipeline-assets/blob/main/.github/workflows/terraform-test-pipeline.md#cra-config-yaml -# - -version: "v1" -CRA_TARGETS: - - CRA_TARGET: "solutions/fully-configurable" # Target directory for CRA scan. If not provided, the CRA Scan will not be run. - CRA_IGNORE_RULES_FILE: "cra-tf-validate-ignore-rules.json" - PROFILE_ID: "fe96bd4d-9b37-40f2-b39f-a62760e326a3" # SCC profile ID (currently set to 'IBM Cloud Framework for Financial Services' '1.7.0' profile). - # SCC_INSTANCE_ID: "" # The SCC instance ID to use to download profile for CRA scan. If not provided, a default global value will be used. - # SCC_REGION: "" # The IBM Cloud region that the SCC instance is in. If not provided, a default global value will be used. - CRA_ENVIRONMENT_VARIABLES: # An optional map of environment variables for CRA, where the key is the variable name and value is the value. Useful for providing TF_VARs. - TF_VAR_prefix: "mock" - TF_VAR_region: "us-south" - TF_VAR_application_loadbalancer_pool_member_ip_address: ["159.23.92.5", "159.23.92.6"] - TF_VAR_private_path_service_endpoints: ["vpc-pp.example.com"] - TF_VAR_existing_vpc_id: "r006-a95450db-e5c3-49fb-b630-31aea1deb8d8" - TF_VAR_provider_visibility: "public" diff --git a/cra-tf-validate-ignore-rules.json b/cra-tf-validate-ignore-rules.json deleted file mode 100644 index 8196ecf..0000000 --- a/cra-tf-validate-ignore-rules.json +++ /dev/null @@ -1,16 +0,0 @@ -{ - "scc_rules": [ - { - "scc_rule_id": "rule-0e5151b1-9caf-433c-b4e5-be3d505e458e", - "description": "Check whether Application Load Balancer for VPC is configured with multiple members in the pool", - "ignore_reason": "This rule is not relevant to since we are attaching IP addresses to the ALB.", - "is_valid": false - }, - { - "scc_rule_id": "rule-d544f217-3723-4376-b3aa-037c5f201e8d", - "description": "Check whether Application Load Balancer for VPC uses HTTPS (SSL & TLS) instead of HTTP", - "ignore_reason": "This rule is not relevant since ALB will be a member of the Private Path NLB.", - "is_valid": false - } - ] -}