diff --git a/tfutils/awssource.go b/tfutils/awssource.go index acbaa1f5..5e6c3285 100644 --- a/tfutils/awssource.go +++ b/tfutils/awssource.go @@ -556,6 +556,12 @@ var AwssourceData = map[string][]TfMapData{ QueryField: "arn", Scope: "*", }, + { + Type: "elbv2-load-balancer", + Method: sdp.QueryMethod_SEARCH, + QueryField: "id", + Scope: "*", + }, }, "aws_lb_listener": { { @@ -786,6 +792,12 @@ var AwssourceData = map[string][]TfMapData{ QueryField: "arn", Scope: "*", }, + { + Type: "route53-resource-record-set", + Method: sdp.QueryMethod_SEARCH, + QueryField: "id", + Scope: "*", + }, }, "aws_route53_zone": { { @@ -1010,12 +1022,6 @@ var AwssourceData = map[string][]TfMapData{ }, }, "aws_security_group_rule": { - { - Type: "ec2-security-group-rule", - Method: sdp.QueryMethod_GET, - QueryField: "id", - Scope: "*", - }, { Type: "ec2-security-group-rule", Method: sdp.QueryMethod_GET, @@ -1117,6 +1123,22 @@ var AwssourceData = map[string][]TfMapData{ Scope: "*", }, }, + "aws_vpc_security_group_egress_rule": { + { + Type: "ec2-security-group-rule", + Method: sdp.QueryMethod_GET, + QueryField: "security_group_rule_id", + Scope: "*", + }, + }, + "aws_vpc_security_group_ingress_rule": { + { + Type: "ec2-security-group-rule", + Method: sdp.QueryMethod_GET, + QueryField: "security_group_rule_id", + Scope: "*", + }, + }, "egress_only_internet_gateway": { { Type: "ec2-egress-only-internet-gateway",