diff --git a/internal/api/alertprofile/alertprofile.go b/internal/api/alertprofile/alertprofile.go index c08ed0d9..bbc53bde 100755 --- a/internal/api/alertprofile/alertprofile.go +++ b/internal/api/alertprofile/alertprofile.go @@ -146,13 +146,6 @@ type Defender struct { Rules []string `json:"rules,omitempty"` } -// Access -type Docker struct { - Enabled bool `json:"enabled"` - Allrules bool `json:"allRules"` - Rules []string `json:"rules,omitempty"` -} - // WAAS Firewall (host) type HostAppFirewall struct { Enabled bool `json:"enabled"` @@ -264,7 +257,6 @@ type Policy struct { ContainerRuntime ContainerRuntime `json:"containerRuntime,omitempty"` ContainerVulnerability ContainerVulnerability `json:"containerVulnerability,omitempty"` Defender Defender `json:"defender,omitempty"` - Docker Docker `json:"docker,omitempty"` HostAppFirewall HostAppFirewall `json:"hostAppFirewall,omitempty"` HostCompliance HostCompliance `json:"hostCompliance,omitempty"` HostComplianceScan HostComplianceScan `json:"hostComplianceScan,omitempty"` diff --git a/internal/convert/alertprofile.go b/internal/convert/alertprofile.go index 8c7896de..d1c6b1ed 100644 --- a/internal/convert/alertprofile.go +++ b/internal/convert/alertprofile.go @@ -130,16 +130,6 @@ func AlertProfilePoliciesToSchema(d *alertprofile.Policy) interface{} { } } - if d.Docker.Enabled { - alertTriggerPolicies["docker"] = []interface{}{ - map[string]interface{}{ - "enabled": d.Docker.Enabled, - "all_rules": d.Docker.Allrules, - "rules": d.Docker.Rules, - }, - } - } - if d.HostAppFirewall.Enabled { alertTriggerPolicies["host_app_firewall"] = []interface{}{ map[string]interface{}{ @@ -402,15 +392,6 @@ func SchemaToAlertprofile(d *schema.ResourceData) (alertprofile.AlertProfile, er } } - for _, cv := range alertTrigger.(map[string]interface{})["docker"].([]interface{}) { - parsedAlertProfile.Policy.Docker.Enabled = cv.(map[string]interface{})["enabled"].(bool) - parsedAlertProfile.Policy.Docker.Allrules = cv.(map[string]interface{})["all_rules"].(bool) - - for _, rule := range cv.(map[string]interface{})["rules"].([]interface{}) { - parsedAlertProfile.Policy.Docker.Rules = append(parsedAlertProfile.Policy.Docker.Rules, rule.(string)) - } - } - for _, cv := range alertTrigger.(map[string]interface{})["host_app_firewall"].([]interface{}) { parsedAlertProfile.Policy.HostAppFirewall.Enabled = cv.(map[string]interface{})["enabled"].(bool) parsedAlertProfile.Policy.HostAppFirewall.Allrules = cv.(map[string]interface{})["all_rules"].(bool) diff --git a/internal/provider/resource_alertprofile.go b/internal/provider/resource_alertprofile.go index 0ca36e78..c8561279 100644 --- a/internal/provider/resource_alertprofile.go +++ b/internal/provider/resource_alertprofile.go @@ -394,32 +394,6 @@ func resourceAlertprofile() *schema.Resource { }, }, }, - "docker": { - Type: schema.TypeList, - MaxItems: 1, - Optional: true, - Description: "Access", - Elem: &schema.Resource{ - Schema: map[string]*schema.Schema{ - "enabled": { - Type: schema.TypeBool, - Required: true, - }, - "all_rules": { - Type: schema.TypeBool, - Required: true, - }, - "rules": { - Type: schema.TypeList, - Optional: true, - Computed: true, - Elem: &schema.Schema{ - Type: schema.TypeString, - }, - }, - }, - }, - }, "host_app_firewall": { Type: schema.TypeList, MaxItems: 1,