diff --git a/cra-config.yaml b/cra-config.yaml deleted file mode 100644 index 5620739..0000000 --- a/cra-config.yaml +++ /dev/null @@ -1,6 +0,0 @@ -# More info about this file at https://github.com/terraform-ibm-modules/common-pipeline-assets/blob/main/.github/workflows/terraform-test-pipeline.md#cra-config-yaml -version: "v1" -CRA_TARGETS: - - CRA_TARGET: "examples/complete" # Target directory for CRA scan. If not provided, the CRA Scan will not be run. - CRA_IGNORE_RULES_FILE: "cra-tf-validate-ignore-rules.json" # CRA Ignore file to use. If not provided, it checks the repo root directory for `cra-tf-validate-ignore-rules.json` - PROFILE_ID: "fe96bd4d-9b37-40f2-b39f-a62760e326a3" # SCC profile ID (currently set to 'IBM Cloud Framework for Financial Services' '1.7.0' profile). diff --git a/cra-tf-validate-ignore-rules.json b/cra-tf-validate-ignore-rules.json deleted file mode 100644 index 8829fce..0000000 --- a/cra-tf-validate-ignore-rules.json +++ /dev/null @@ -1,16 +0,0 @@ -{ - "scc_rules": [ - { - "scc_rule_id": "rule-8cbd597c-7471-42bd-9c88-36b2696456e9", - "description": "Check whether Cloud Object Storage network access is restricted to a specific IP range", - "ignore_reason": "This rule is not relevant to the module itself, just the COS resource that is used in the example that is scanned", - "is_valid": false - }, - { - "scc_rule_id": "rule-c97259ee-336d-4c5f-b436-1868107a9558", - "description": "Check whether Cloud Object Storage is enabled with customer-managed encryption and Keep Your Own Key (KYOK)", - "ignore_reason": "This rule is not relevant to the module itself, just the COS resource that is used in the example that is scanned", - "is_valid": false - } - ] -}