From 73cfd5a7ae1722b08e7f182f9c0c695899b3efc5 Mon Sep 17 00:00:00 2001 From: akocbek Date: Tue, 18 Nov 2025 10:31:56 +0000 Subject: [PATCH] ci: remove CRA related files --- cra-config.yaml | 6 ------ cra-tf-validate-ignore-rules.json | 23 ----------------------- 2 files changed, 29 deletions(-) delete mode 100644 cra-config.yaml delete mode 100644 cra-tf-validate-ignore-rules.json diff --git a/cra-config.yaml b/cra-config.yaml deleted file mode 100644 index d495e495..00000000 --- a/cra-config.yaml +++ /dev/null @@ -1,6 +0,0 @@ -# More info about this file at https://github.com/terraform-ibm-modules/common-pipeline-assets/blob/main/.github/workflows/terraform-test-pipeline.md#cra-config-yaml -version: "v1" -CRA_TARGETS: - - CRA_TARGET: "examples/logs-agent-ocp" # Target directory for CRA scan. If not provided, the CRA Scan will not be run. - CRA_IGNORE_RULES_FILE: "cra-tf-validate-ignore-rules.json" # CRA Ignore file to use. If not provided, it checks the repo root directory for `cra-tf-validate-ignore-rules.json` - PROFILE_ID: "fe96bd4d-9b37-40f2-b39f-a62760e326a3" # SCC profile ID (currently set to 'IBM Cloud Framework for Financial Services' '1.7.0' profile). diff --git a/cra-tf-validate-ignore-rules.json b/cra-tf-validate-ignore-rules.json deleted file mode 100644 index 45bef2ac..00000000 --- a/cra-tf-validate-ignore-rules.json +++ /dev/null @@ -1,23 +0,0 @@ - -{ - "scc_rules": [ - { - "scc_rule_id": "rule-216e2449-27d7-4afc-929a-b66e196a9cf9", - "description": "Check whether Flow Logs for VPC are enabled", - "ignore_reason": "This rule is not relevant to the module itself, just the VPC resource that is used in the example that is scanned", - "is_valid": false - }, - { - "scc_rule_id": "rule-2325054a-c338-474a-9740-0b7034487e40", - "description:": "Check whether OpenShift clusters are accessible only by using private endpoints", - "ignore_reason": "This rule is not relevant to the module itself, just the cluster resource that is used in the example that is scanned", - "is_valid": false - }, - { - "scc_rule_id": "rule-64c0bea0-8760-4a6b-a56c-ee375a48961e", - "description:": "Check whether Virtual Private Cloud (VPC) has no public gateways attached", - "ignore_reason": "This rule is not relevant to the module itself, just the VPC resource that is used in the example that is scanned", - "is_valid": false - } - ] -}