@@ -209,12 +209,13 @@ func setTFResourcePolicyRulesDrift(d *schema.ResourceData, policy v2.PolicyRules
209209 enabled := (mode != "disabled" )
210210
211211 ruleMap := map [string ]interface {}{
212- "id" : rule .Id ,
213- "name" : rule .Name ,
214- "description" : rule .Description ,
215- "version" : rule .Version ,
216- "tags" : rule .Tags ,
217- "enabled" : enabled ,
212+ "id" : rule .Id ,
213+ "name" : rule .Name ,
214+ "description" : rule .Description ,
215+ "version" : rule .Version ,
216+ "tags" : rule .Tags ,
217+ "enabled" : enabled ,
218+ "mounted_volume_drift_enabled" : driftDetails .MountedVolumeDriftEnabled ,
218219 }
219220
220221 if exceptionsBlock != nil {
@@ -495,18 +496,21 @@ func setPolicyRulesDrift(policy *v2.PolicyRulesComposite, d *schema.ResourceData
495496 mode = "disabled"
496497 }
497498
499+ mountedVolumeDriftEnabled := d .Get ("rule.0.mounted_volume_drift_enabled" ).(bool )
500+
498501 rule := & v2.RuntimePolicyRule {
499502 // TODO: Do not hardcode the indexes
500503 Name : d .Get ("rule.0.name" ).(string ),
501504 Description : d .Get ("rule.0.description" ).(string ),
502505 Tags : tags ,
503506 Details : v2.DriftRuleDetails {
504- RuleType : v2 .ElementType (driftElementType ), // TODO: Use const
505- Mode : mode ,
506- Exceptions : & exceptions ,
507- ProhibitedBinaries : & prohibitedBinaries ,
508- ProcessBasedExceptions : & processBasedExceptions ,
509- ProcessBasedDenylist : & processBasedProhibitedBinaries ,
507+ RuleType : v2 .ElementType (driftElementType ), // TODO: Use const
508+ Mode : mode ,
509+ Exceptions : & exceptions ,
510+ ProhibitedBinaries : & prohibitedBinaries ,
511+ ProcessBasedExceptions : & processBasedExceptions ,
512+ ProcessBasedDenylist : & processBasedProhibitedBinaries ,
513+ MountedVolumeDriftEnabled : mountedVolumeDriftEnabled ,
510514 },
511515 }
512516
0 commit comments