Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(scanning): deprecate legacy scanning engine resources #474

Merged
merged 2 commits into from
Jan 26, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 5 additions & 4 deletions sysdig/resource_sysdig_secure_scanningpolicies.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,10 +15,11 @@ func resourceSysdigSecureScanningPolicy() *schema.Resource {
timeout := 5 * time.Minute

return &schema.Resource{
CreateContext: resourceSysdigScanningPolicyCreate,
ReadContext: resourceSysdigScanningPolicyRead,
UpdateContext: resourceSysdigScanningPolicyUpdate,
DeleteContext: resourceSysdigScanningPolicyDelete,
DeprecationMessage: "The legacy scanning engine has been deprecated. This resource will be removed in future releases.",
CreateContext: resourceSysdigScanningPolicyCreate,
ReadContext: resourceSysdigScanningPolicyRead,
UpdateContext: resourceSysdigScanningPolicyUpdate,
DeleteContext: resourceSysdigScanningPolicyDelete,
Importer: &schema.ResourceImporter{
StateContext: schema.ImportStatePassthroughContext,
},
Expand Down
9 changes: 5 additions & 4 deletions sysdig/resource_sysdig_secure_scanningpoliciesassignments.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,10 +16,11 @@ func resourceSysdigSecureScanningPolicyAssignment() *schema.Resource {
timeout := 5 * time.Minute

return &schema.Resource{
CreateContext: resourceSysdigScanningPolicyAssignmentCreate,
ReadContext: resourceSysdigScanningPolicyAssignmentRead,
UpdateContext: resourceSysdigScanningPolicyAssignmentUpdate,
DeleteContext: resourceSysdigScanningPolicyAssignmentDelete,
DeprecationMessage: "The legacy scanning engine has been deprecated. This resource will be removed in future releases.",
CreateContext: resourceSysdigScanningPolicyAssignmentCreate,
ReadContext: resourceSysdigScanningPolicyAssignmentRead,
UpdateContext: resourceSysdigScanningPolicyAssignmentUpdate,
DeleteContext: resourceSysdigScanningPolicyAssignmentDelete,
Importer: &schema.ResourceImporter{
StateContext: schema.ImportStatePassthroughContext,
},
Expand Down
9 changes: 5 additions & 4 deletions sysdig/resource_sysdig_secure_vulnerability_exception.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,10 +16,11 @@ func resourceSysdigSecureVulnerabilityException() *schema.Resource {
timeout := 5 * time.Minute

return &schema.Resource{
CreateContext: resourceSysdigVulnerabilityExceptionCreate,
ReadContext: resourceSysdigVulnerabilityExceptionRead,
UpdateContext: resourceSysdigVulnerabilityExceptionUpdate,
DeleteContext: resourceSysdigVulnerabilityExceptionDelete,
DeprecationMessage: "The legacy scanning engine has been deprecated. This resource will be removed in future releases.",
CreateContext: resourceSysdigVulnerabilityExceptionCreate,
ReadContext: resourceSysdigVulnerabilityExceptionRead,
UpdateContext: resourceSysdigVulnerabilityExceptionUpdate,
DeleteContext: resourceSysdigVulnerabilityExceptionDelete,
Importer: &schema.ResourceImporter{
StateContext: func(ctx context.Context, data *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) {
parts := strings.SplitN(data.Id(), "/", 2)
Expand Down
9 changes: 5 additions & 4 deletions sysdig/resource_sysdig_secure_vulnerability_exception_list.go
Original file line number Diff line number Diff line change
Expand Up @@ -14,10 +14,11 @@ func resourceSysdigSecureVulnerabilityExceptionList() *schema.Resource {
timeout := 5 * time.Minute

return &schema.Resource{
CreateContext: resourceSysdigVulnerabilityExceptionListCreate,
ReadContext: resourceSysdigVulnerabilityExceptionListRead,
UpdateContext: resourceSysdigVulnerabilityExceptionListUpdate,
DeleteContext: resourceSysdigVulnerabilityExceptionListDelete,
DeprecationMessage: "The legacy scanning engine has been deprecated. This resource will be removed in future releases.",
CreateContext: resourceSysdigVulnerabilityExceptionListCreate,
ReadContext: resourceSysdigVulnerabilityExceptionListRead,
UpdateContext: resourceSysdigVulnerabilityExceptionListUpdate,
DeleteContext: resourceSysdigVulnerabilityExceptionListDelete,
Importer: &schema.ResourceImporter{
StateContext: schema.ImportStatePassthroughContext,
},
Expand Down
4 changes: 2 additions & 2 deletions website/docs/r/secure_scanning_policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,9 @@ description: |-

# Resource: sysdig_secure_scanning_policy

Creates a Sysdig Secure Policy.
Creates a Sysdig Secure Policy (legacy scanning engine).

-> **Note:** Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a [new issue](https://github.com/sysdiglabs/terraform-provider-sysdig/issues/new) in the GitHub repository.
-> **Note:** Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a [new issue](https://github.com/sysdiglabs/terraform-provider-sysdig/issues/new) in the GitHub repository.

## Example Usage

Expand Down
6 changes: 3 additions & 3 deletions website/docs/r/secure_scanning_policy_assignment.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,9 @@ description: |-

# Resource: sysdig_secure_scanning_policy_assignment

Creates a Sysdig Secure Policy Assignment.
Creates a Sysdig Secure Policy Assignment (legacy scanning engine).

-> **Note:** Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a [new issue](https://github.com/sysdiglabs/terraform-provider-sysdig/issues/new) in the GitHub repository.
-> **Note:** Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a [new issue](https://github.com/sysdiglabs/terraform-provider-sysdig/issues/new) in the GitHub repository.

## Example Usage

Expand Down Expand Up @@ -52,7 +52,7 @@ resource "sysdig_secure_scanning_policy_assignment" "assignment_example" {

policy_ids = [sysdig_secure_scanning_policy.scanning_policy_example.id, "default"]
}

}
```

Expand Down
6 changes: 3 additions & 3 deletions website/docs/r/secure_vulnerability_exception.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,9 @@ description: |-

# Resource: sysdig_secure_vulnerability_exception

Creates a Sysdig Secure Vulnerability Exception.
Creates a Sysdig Secure Vulnerability Exception (legacy scanning engine).

-> **Note:** Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a [new issue](https://github.com/sysdiglabs/terraform-provider-sysdig/issues/new) in the GitHub repository.
-> **Note:** Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a [new issue](https://github.com/sysdiglabs/terraform-provider-sysdig/issues/new) in the GitHub repository.

## Example Usage

Expand Down Expand Up @@ -60,4 +60,4 @@ Vulnerability exception can be imported using the ID of the exception list, and

```
$ terraform import sysdig_secure_vulnerability_exception.example vulnexception_1iTWe5s3qFivOW4jcj5X8nnG3hn/vulnexceptionitem_1n1HL7la7LyJFAzr0DEc0hVbnFU
```
```
6 changes: 3 additions & 3 deletions website/docs/r/secure_vulnerability_exception_list.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,9 @@ description: |-

# Resource: sysdig_secure_vulnerability_exception_list

Creates a Sysdig Secure Vulnerability Exception list that will hold all the vulnerability exceptions.
Creates a Sysdig Secure Vulnerability Exception list that will hold all the vulnerability exceptions (legacy scanning engine).

-> **Note:** Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a [new issue](https://github.com/sysdiglabs/terraform-provider-sysdig/issues/new) in the GitHub repository.
-> **Note:** Sysdig Terraform Provider is under rapid development at this point. If you experience any issue or discrepancy while using it, please make sure you have the latest version. If the issue persists, or you have a Feature Request to support an additional set of resources, please open a [new issue](https://github.com/sysdiglabs/terraform-provider-sysdig/issues/new) in the GitHub repository.

## Example Usage

Expand All @@ -37,4 +37,4 @@ Vulnerability exception lists can be imported using the ID, e.g.

```
$ terraform import sysdig_secure_vulnerability_exception_list.example vulnexception_1iTWe5s3qFivOW4jcj5X8nnG3hn
```
```
Loading