From 3e1fa4c704c29f2fa09ab0d74dd3c6410439021c Mon Sep 17 00:00:00 2001 From: Admiralawkbar Date: Thu, 3 Dec 2020 15:19:59 -0600 Subject: [PATCH] fix tap --- .../reports/expected-TERRAFORM_TERRASCAN.tap | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.automation/test/terraform_terrascan/reports/expected-TERRAFORM_TERRASCAN.tap b/.automation/test/terraform_terrascan/reports/expected-TERRAFORM_TERRASCAN.tap index 3e0c1bd6..474750f7 100644 --- a/.automation/test/terraform_terrascan/reports/expected-TERRAFORM_TERRASCAN.tap +++ b/.automation/test/terraform_terrascan/reports/expected-TERRAFORM_TERRASCAN.tap @@ -1,7 +1,7 @@ TAP version 13 1..2 -not ok 1 - terraform_bad_1.tf +not ok 1 - terraform-terrascan_bad_1.tf --- - message: results \n violations \n - rule_name instanceWithNoVpc\n description Instance should be configured in vpc. AWS VPCs provides the controls to facilitate a formal process for approving and testing all network connections and changes to the firewall and router configurations.\n rule_id AWS.Instance.NetworkSecurity.Medium.0506\n severity MEDIUM\n category Network Security\n resource_name instanceWithNoVpc\n resource_type aws_instance\n file terraform_bad_1.tf\n line 1\n count \n low 0\n medium 1\n high 0\n total 1\n + message: results \n violations \n - rule_name instanceWithNoVpc\n description Instance should be configured in vpc. AWS VPCs provides the controls to facilitate a formal process for approving and testing all network connections and changes to the firewall and router configurations.\n rule_id AWS.Instance.NetworkSecurity.Medium.0506\n severity MEDIUM\n category Network Security\n resource_name instanceWithNoVpc\n resource_type aws_instance\n file terraform-terrascan_bad_1.tf\n line 1\n count \n low 0\n medium 1\n high 0\n total 1\n ... -ok 2 - terraform_good_1.tf +ok 2 - terraform-terrascan_good_1.tf