Skip to content

Commit 8d92c94

Browse files
authored
fix(policy): fix actions to not apply different schema on actions in state (#281)
1 parent 9cc9632 commit 8d92c94

File tree

2 files changed

+8
-3
lines changed

2 files changed

+8
-3
lines changed

sysdig/resource_sysdig_secure_policy.go

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -161,24 +161,22 @@ func policyToResourceData(policy *secure.Policy, d *schema.ResourceData) {
161161
_ = d.Set("type", "falco")
162162

163163
}
164-
_ = d.Set("actions", policy.Actions)
165164

166165
actions := []map[string]interface{}{{}}
167166
for _, action := range policy.Actions {
168167
if action.Type != "POLICY_ACTION_CAPTURE" {
169168
action := strings.Replace(action.Type, "POLICY_ACTION_", "", 1)
170169
actions[0]["container"] = strings.ToLower(action)
171-
_ = d.Set("actions", actions)
172170
//d.Set("actions.0.container", strings.ToLower(action))
173171
} else {
174172
actions[0]["capture"] = []map[string]interface{}{{
175173
"seconds_after_event": action.AfterEventNs / 1000000000,
176174
"seconds_before_event": action.BeforeEventNs / 1000000000,
177175
"name": action.Name,
178176
}}
179-
_ = d.Set("actions", actions)
180177
}
181178
}
179+
_ = d.Set("actions", actions)
182180

183181
_ = d.Set("notification_channels", policy.NotificationChannelIds)
184182

sysdig/resource_sysdig_secure_policy_test.go

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,8 @@ resource "sysdig_secure_policy" "sample2" {
103103
rule_names = [sysdig_secure_rule_falco.terminal_shell.name]
104104
105105
notification_channels = [sysdig_secure_notification_channel_email.sample_email.id]
106+
107+
actions {}
106108
}
107109
`, secureNotificationChannelEmailWithName(name), ruleFalcoTerminalShell(name), name, name)
108110
}
@@ -116,6 +118,7 @@ resource "sysdig_secure_policy" "sample3" {
116118
severity = 4
117119
scope = "container.id != \"\""
118120
rule_names = ["Terminal shell in container"]
121+
actions {}
119122
}
120123
`, name, name)
121124
}
@@ -125,6 +128,7 @@ func policyWithMinimumConfiguration(name string) string {
125128
resource "sysdig_secure_policy" "sample4" {
126129
name = "TERRAFORM TEST 4 %s"
127130
description = "TERRAFORM TEST %s"
131+
actions {}
128132
}
129133
`, name, name)
130134
}
@@ -178,6 +182,7 @@ resource "sysdig_secure_policy" "sample4" {
178182
name = "TERRAFORM TEST 4 %s"
179183
description = "TERRAFORM TEST %s"
180184
type = "aws_cloudtrail"
185+
actions {}
181186
}
182187
`, name, name)
183188
}
@@ -188,6 +193,7 @@ resource "sysdig_secure_policy" "sample5" {
188193
name = "TERRAFORM TEST %s"
189194
description = "TERRAFORM TEST %s"
190195
type = "gcp_auditlog"
196+
actions {}
191197
}
192198
`, name, name)
193199
}
@@ -198,6 +204,7 @@ resource "sysdig_secure_policy" "sample6" {
198204
name = "TERRAFORM TEST %s"
199205
description = "TERRAFORM TEST %s"
200206
type = "azure_platformlogs"
207+
actions {}
201208
}
202209
`, name, name)
203210
}

0 commit comments

Comments
 (0)