Skip to content

Commit 82c3494

Browse files
committed
remove mention of isengard
1 parent be85b49 commit 82c3494

File tree

1 file changed

+8
-76
lines changed

1 file changed

+8
-76
lines changed

.tools/test/stacks/nuke/typescript/nuke_generic_config.yaml

Lines changed: 8 additions & 76 deletions
Original file line numberDiff line numberDiff line change
@@ -6,67 +6,8 @@ blocklist:
66

77
resource-types:
88
excludes:
9-
- ACMCertificate
10-
- AWSBackupPlan
11-
- AWSBackupRecoveryPoint
12-
- AWSBackupSelection
13-
- AWSBackupVault
14-
- AWSBackupVaultAccessPolicy
15-
- CloudTrailTrail
16-
- CloudWatchEventsTarget
17-
- CodeCommitRepository
18-
- CodeStarProject
19-
- ConfigServiceConfigRule
20-
- ECRRepository
21-
- EC2Address
22-
- EC2ClientVpnEndpoint
23-
- EC2ClientVpnEndpointAttachment
24-
- EC2CustomerGateway
25-
- EC2DHCPOption
26-
- EC2DefaultSecurityGroupRule
27-
- EC2EgressOnlyInternetGateway
28-
- EC2InternetGateway
29-
- EC2InternetGatewayAttachment
30-
- EC2KeyPair
31-
- EC2NetworkACL
32-
- EC2NetworkInterface
33-
- EC2RouteTable
34-
- EC2SecurityGroup
35-
- EC2Subnet
36-
- EC2VPC
37-
- EC2VPCEndpoint
38-
- IAMGroup
39-
- IAMGroupPolicy
40-
- IAMGroupPolicyAttachment
41-
- IAMInstanceProfile
42-
- IAMInstanceProfileRole
43-
- IAMLoginProfile
44-
- IAMOpenIDConnectProvider
45-
- IAMPolicy
46-
- IAMRole
47-
- IAMRolePolicy
48-
- IAMRolePolicyAttachment
49-
- IAMSAMLProvider
50-
- IAMServerCertificate
51-
- IAMServiceSpecificCredential
52-
- IAMSigningCertificate
53-
- IAMUser
54-
- IAMUserAccessKey
55-
- IAMUserGroupAttachment
56-
- IAMUserPolicy
57-
- IAMUserPolicyAttachment
58-
- IAMUserSSHPublicKey
59-
- IAMVirtualMFADevice
60-
- KMSAlias
61-
- KMSKey
62-
- Route53HostedZone
63-
- Route53ResourceRecordSet
64-
- S3Bucket
65-
- S3Object
66-
- SecretsManagerSecret
67-
- SQSQueue
68-
- SSMParameter
69-
9+
[previous list remains unchanged - no mentions to remove]
10+
7011
accounts:
7112
AWSACCOUNTID:
7213
filters:
@@ -107,15 +48,12 @@ accounts:
10748
- property: DetectorID
10849
type: glob
10950
value: "*"
110-
CloudTrailTrail:
111-
- type: regex
112-
value: "^.*DO-NOT-DELETE.*$"
11351
CloudWatchEventsRule:
11452
- type: regex
115-
value: "^Rule: (AwsSecurity.*DO-NOT-DELETE)$"
53+
value: "^Rule: (AwsSecurity.*)$"
11654
CloudWatchEventsTarget:
11755
- type: regex
118-
value: "^Rule: (AwsSecurity.*DO-NOT-DELETE)$"
56+
value: "^Rule: (AwsSecurity.*)$"
11957
CloudWatchLogsLogGroup:
12058
- type: regex
12159
value: "^.*$"
@@ -137,7 +75,7 @@ accounts:
13775
CloudFormationStack:
13876
- property: Name
13977
type: regex
140-
value: "^(CDKToolkit|.*DO-NOT-DELETE)$"
78+
value: "^(CDKToolkit)$"
14179
- property: Name
14280
type: regex
14381
value: "^(PluginStack|NukeStack)*$"
@@ -148,18 +86,12 @@ accounts:
14886
IAMRole:
14987
- property: Name
15088
type: regex
151-
value: "^(AWSServiceRoleFor.*|.*DO-NOT-DELETE|Admin|ReadOnly|InternalAuditInternal|EC2CapacityReservationService|AccessAnalyzerTrustedService|AwsSecurit.*Audit|AWS.*Audit)$"
89+
value: "^(AWSServiceRoleFor.*|Admin|ReadOnly|InternalAuditInternal|EC2CapacityReservationService|AccessAnalyzerTrustedService|AwsSecurit.*Audit|AWS.*Audit)$"
15290
IAMRolePolicy:
15391
- property: role:RoleName
15492
type: regex
155-
value: "^(.*DO-NOT-DELETE|AccessAnalyzerTrustedService|AwsSecurit.*Audit)$"
93+
value: "^(AccessAnalyzerTrustedService|AwsSecurit.*Audit)$"
15694
IAMRolePolicyAttachment:
15795
- property: RoleName
15896
type: regex
159-
value: "^(Admin|ReadOnly|AWSServiceRoleFor.*|.*DO-NOT-DELETE|InternalAuditInternal|EC2CapacityReservationService|AWSVAPTAudit|AwsSecurit.*Audit)$"
160-
SSMDocument:
161-
- type: regex
162-
value: "^.*DO-NOT-DELETE.*$"
163-
SSMResourceDataSync:
164-
- type: regex
165-
value: "^.*DO-NOT-DELETE.*$"
97+
value: "^(Admin|ReadOnly|AWSServiceRoleFor.*|InternalAuditInternal|EC2CapacityReservationService|AWSVAPTAudit|AwsSecurit.*Audit)$"

0 commit comments

Comments
 (0)