-
Notifications
You must be signed in to change notification settings - Fork 355
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto generate rules from AWS API models
- Loading branch information
Showing
165 changed files
with
13,740 additions
and
40 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
[submodule "rules/awsrules/models/aws-sdk-go"] | ||
path = rules/awsrules/models/aws-sdk-go | ||
url = https://github.com/aws/aws-sdk-go.git |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Submodule aws-sdk-go
added at
594c84
87 changes: 87 additions & 0 deletions
87
rules/awsrules/models/aws_acm_certificate_invalid_certificate_body.go
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,87 @@ | ||
// This file generated by `tools/model-rule-gen/main.go`. DO NOT EDIT | ||
|
||
package models | ||
|
||
import ( | ||
"log" | ||
"regexp" | ||
|
||
"github.com/hashicorp/hcl2/hcl" | ||
"github.com/wata727/tflint/issue" | ||
"github.com/wata727/tflint/tflint" | ||
) | ||
|
||
// AwsAcmCertificateInvalidCertificateBodyRule checks the pattern is valid | ||
type AwsAcmCertificateInvalidCertificateBodyRule struct { | ||
resourceType string | ||
attributeName string | ||
max int | ||
min int | ||
pattern *regexp.Regexp | ||
} | ||
|
||
// NewAwsAcmCertificateInvalidCertificateBodyRule returns new rule with default attributes | ||
func NewAwsAcmCertificateInvalidCertificateBodyRule() *AwsAcmCertificateInvalidCertificateBodyRule { | ||
return &AwsAcmCertificateInvalidCertificateBodyRule{ | ||
resourceType: "aws_acm_certificate", | ||
attributeName: "certificate_body", | ||
max: 32768, | ||
min: 1, | ||
pattern: regexp.MustCompile(`^-{5}BEGIN CERTIFICATE-{5}\x{000D}?\x{000A}([A-Za-z0-9/+]{64}\x{000D}?\x{000A})*[A-Za-z0-9/+]{1,64}={0,2}\x{000D}?\x{000A}-{5}END CERTIFICATE-{5}(\x{000D}?\x{000A})?$`), | ||
} | ||
} | ||
|
||
// Name returns the rule name | ||
func (r *AwsAcmCertificateInvalidCertificateBodyRule) Name() string { | ||
return "aws_acm_certificate_invalid_certificate_body" | ||
} | ||
|
||
// Enabled returns whether the rule is enabled by default | ||
func (r *AwsAcmCertificateInvalidCertificateBodyRule) Enabled() bool { | ||
return true | ||
} | ||
|
||
// Type returns the rule severity | ||
func (r *AwsAcmCertificateInvalidCertificateBodyRule) Type() string { | ||
return issue.ERROR | ||
} | ||
|
||
// Link returns the rule reference link | ||
func (r *AwsAcmCertificateInvalidCertificateBodyRule) Link() string { | ||
return "" | ||
} | ||
|
||
// Check checks the pattern is valid | ||
func (r *AwsAcmCertificateInvalidCertificateBodyRule) Check(runner *tflint.Runner) error { | ||
log.Printf("[INFO] Check `%s` rule for `%s` runner", r.Name(), runner.TFConfigPath()) | ||
|
||
return runner.WalkResourceAttributes(r.resourceType, r.attributeName, func(attribute *hcl.Attribute) error { | ||
var val string | ||
err := runner.EvaluateExpr(attribute.Expr, &val) | ||
|
||
return runner.EnsureNoError(err, func() error { | ||
if len(val) > r.max { | ||
runner.EmitIssue( | ||
r, | ||
"certificate_body must be 32768 characters or less", | ||
attribute.Expr.Range(), | ||
) | ||
} | ||
if len(val) < r.min { | ||
runner.EmitIssue( | ||
r, | ||
"certificate_body must be 1 characters or higher", | ||
attribute.Expr.Range(), | ||
) | ||
} | ||
if !r.pattern.MatchString(val) { | ||
runner.EmitIssue( | ||
r, | ||
`certificate_body does not match valid pattern ^-{5}BEGIN CERTIFICATE-{5}\x{000D}?\x{000A}([A-Za-z0-9/+]{64}\x{000D}?\x{000A})*[A-Za-z0-9/+]{1,64}={0,2}\x{000D}?\x{000A}-{5}END CERTIFICATE-{5}(\x{000D}?\x{000A})?$`, | ||
attribute.Expr.Range(), | ||
) | ||
} | ||
return nil | ||
}) | ||
}) | ||
} |
135 changes: 135 additions & 0 deletions
135
rules/awsrules/models/aws_acm_certificate_invalid_certificate_body_test.go
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,135 @@ | ||
// This file generated by `tools/model-rule-gen/main.go`. DO NOT EDIT | ||
|
||
package models | ||
|
||
import ( | ||
"io/ioutil" | ||
"os" | ||
"testing" | ||
|
||
"github.com/google/go-cmp/cmp" | ||
"github.com/hashicorp/terraform/configs" | ||
"github.com/hashicorp/terraform/configs/configload" | ||
"github.com/hashicorp/terraform/terraform" | ||
"github.com/wata727/tflint/issue" | ||
"github.com/wata727/tflint/tflint" | ||
) | ||
|
||
func Test_AwsAcmCertificateInvalidCertificateBodyRule(t *testing.T) { | ||
cases := []struct { | ||
Name string | ||
Content string | ||
Expected issue.Issues | ||
}{ | ||
{ | ||
Name: "It includes invalid characters", | ||
Content: ` | ||
resource "aws_acm_certificate" "foo" { | ||
certificate_body = <<TEXT | ||
-----BEGIN CERTIFICATE REQUEST----- | ||
MIICjjCCAXYCAQAwSTELMAkGA1UEBhMCSkExCjAIBgNVBAgMAWExCjAIBgNVBAcM | ||
AWIxCjAIBgNVBAoMAWExCjAIBgNVBAsMAWExCjAIBgNVBAMMAWEwggEiMA0GCSqG | ||
SIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5jqT6lQEWbyNeHMEeLJxRN7wPmfJXfWSJ | ||
L42vYPM8Ny8NxUtUE8eYavsJQSp2PcwBxVYatgVPNeL3saPGxfGpkIuaPgQO1n7a | ||
+O+3Vb/GANe3g9RX/3p280DHdm+pppRp68yhivMrtznjXJCebOix+KdgHBMLUqx2 | ||
7FWmqchJ+vQ74wmuDR1Y5fh69NDn79kB8ZJiUpZWQ0CPrgoi8KxWU8FT0JnQxBvE | ||
6CJ81P2/1LtJ//ngasyux37j3R64Q4ZLgTX9VtAX+Bnoy9Nh9wTb6zbjh6xzO1bN | ||
4IwaFvc+y2F5gZvct6m53p/DfskII+WuH6Gc6nHrN/g/V49Vo+3ZAgMBAAGgADAN | ||
BgkqhkiG9w0BAQsFAAOCAQEAA4W/lkp3oTmjIoyhZxUMv7b1zcRU/s9juzvYdfMB | ||
nkty65GIKc8VgRSdgdXHg9LyAmG2fw/Ek7fHzMb10a6AR6nNn8dDmDSJgP/Li/qH | ||
65ufOAZFwaQESmaOKuixXzpOl55k4iJCgWng1ejxZ1CSQczWdchLgW6af+ykUgLK | ||
i2H5CazWnCBtBRonsDKFE6TYH0NEqdFE/kAyWtKiMOXAV8Jyr2p8K5hMG/8Cusux | ||
Oe04sLexs2p1Og6LKAv9aWk0wYKB15Zjgx1EqKGJOwHJ5pOVXyGiQAnkqGaC0Q4N | ||
EUNkhA1s4v7yBuNuulIfhcbyOeLwnzElTz5RrV/1hgMWMg== | ||
-----END CERTIFICATE REQUEST----- | ||
TEXT | ||
}`, | ||
Expected: []*issue.Issue{ | ||
{ | ||
Detector: "aws_acm_certificate_invalid_certificate_body", | ||
Type: "ERROR", | ||
Message: `certificate_body does not match valid pattern ^-{5}BEGIN CERTIFICATE-{5}\x{000D}?\x{000A}([A-Za-z0-9/+]{64}\x{000D}?\x{000A})*[A-Za-z0-9/+]{1,64}={0,2}\x{000D}?\x{000A}-{5}END CERTIFICATE-{5}(\x{000D}?\x{000A})?$`, | ||
Line: 3, | ||
File: "resource.tf", | ||
}, | ||
}, | ||
}, | ||
{ | ||
Name: "It is valid", | ||
Content: ` | ||
resource "aws_acm_certificate" "foo" { | ||
certificate_body = <<TEXT | ||
-----BEGIN CERTIFICATE----- | ||
MIIDDjCCAfYCCQCMlVDEcxV0gDANBgkqhkiG9w0BAQUFADBJMQswCQYDVQQGEwJK | ||
QTEKMAgGA1UECAwBYTEKMAgGA1UEBwwBYjEKMAgGA1UECgwBYTEKMAgGA1UECwwB | ||
YTEKMAgGA1UEAwwBYTAeFw0xOTA1MTQxNTUxMjhaFw0yOTA1MTExNTUxMjhaMEkx | ||
CzAJBgNVBAYTAkpBMQowCAYDVQQIDAFhMQowCAYDVQQHDAFiMQowCAYDVQQKDAFh | ||
MQowCAYDVQQLDAFhMQowCAYDVQQDDAFhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A | ||
MIIBCgKCAQEAuY6k+pUBFm8jXhzBHiycUTe8D5nyV31kiS+Nr2DzPDcvDcVLVBPH | ||
mGr7CUEqdj3MAcVWGrYFTzXi97GjxsXxqZCLmj4EDtZ+2vjvt1W/xgDXt4PUV/96 | ||
dvNAx3ZvqaaUaevMoYrzK7c541yQnmzosfinYBwTC1KsduxVpqnISfr0O+MJrg0d | ||
WOX4evTQ5+/ZAfGSYlKWVkNAj64KIvCsVlPBU9CZ0MQbxOgifNT9v9S7Sf/54GrM | ||
rsd+490euEOGS4E1/VbQF/gZ6MvTYfcE2+s244escztWzeCMGhb3PstheYGb3Lep | ||
ud6fw37JCCPlrh+hnOpx6zf4P1ePVaPt2QIDAQABMA0GCSqGSIb3DQEBBQUAA4IB | ||
AQCoj/sZfrypif6AoLkqg2WimmK2KvWNf4srEVgI8BBIpnQpmvYdMKm4IBta8eWO | ||
E9Sdh2u8dnTpn9TEwK/hJpisRZey7H4pPXde86QHmJF1YjF+gdwgpsayIHsfCYJ9 | ||
LJxew68jxO9YANwHy6RlS3c+hcNIWfSMOoct/P6vVkcMKOgA/hiMfHELlMzBK68U | ||
r+Ae7wRjNF4Whbxc6bdTOLocmhOjy6IvPC8x6K5RdOYaxVpRNgUz6WgQUI1gZ3hu | ||
YjSaGdqonttvSXhhSnoQEAHIpxvHq/PjOc5qEnzOt9nlYp3Ohr6WQAZfF3iwdd3l | ||
Q2V76qkXAhIjADC7VpZKJiij | ||
-----END CERTIFICATE----- | ||
TEXT | ||
}`, | ||
Expected: []*issue.Issue{}, | ||
}, | ||
} | ||
|
||
dir, err := ioutil.TempDir("", "AwsAcmCertificateInvalidCertificateBodyRule") | ||
if err != nil { | ||
t.Fatal(err) | ||
} | ||
defer os.RemoveAll(dir) | ||
|
||
currentDir, err := os.Getwd() | ||
if err != nil { | ||
t.Fatal(err) | ||
} | ||
defer os.Chdir(currentDir) | ||
|
||
err = os.Chdir(dir) | ||
if err != nil { | ||
t.Fatal(err) | ||
} | ||
|
||
for _, tc := range cases { | ||
loader, err := configload.NewLoader(&configload.Config{}) | ||
if err != nil { | ||
t.Fatal(err) | ||
} | ||
|
||
err = ioutil.WriteFile(dir+"/resource.tf", []byte(tc.Content), os.ModePerm) | ||
if err != nil { | ||
t.Fatal(err) | ||
} | ||
|
||
mod, diags := loader.Parser().LoadConfigDir(".") | ||
if diags.HasErrors() { | ||
t.Fatal(diags) | ||
} | ||
cfg, tfdiags := configs.BuildConfig(mod, configs.DisabledModuleWalker) | ||
if tfdiags.HasErrors() { | ||
t.Fatal(tfdiags) | ||
} | ||
|
||
runner := tflint.NewRunner(tflint.EmptyConfig(), map[string]tflint.Annotations{}, cfg, map[string]*terraform.InputValue{}) | ||
rule := NewAwsAcmCertificateInvalidCertificateBodyRule() | ||
|
||
if err = rule.Check(runner); err != nil { | ||
t.Fatalf("Unexpected error occurred: %s", err) | ||
} | ||
|
||
if !cmp.Equal(tc.Expected, runner.Issues) { | ||
t.Fatalf("Expected issues are not matched:\n %s\n", cmp.Diff(tc.Expected, runner.Issues)) | ||
} | ||
} | ||
} |
87 changes: 87 additions & 0 deletions
87
rules/awsrules/models/aws_acm_certificate_invalid_certificate_chain.go
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,87 @@ | ||
// This file generated by `tools/model-rule-gen/main.go`. DO NOT EDIT | ||
|
||
package models | ||
|
||
import ( | ||
"log" | ||
"regexp" | ||
|
||
"github.com/hashicorp/hcl2/hcl" | ||
"github.com/wata727/tflint/issue" | ||
"github.com/wata727/tflint/tflint" | ||
) | ||
|
||
// AwsAcmCertificateInvalidCertificateChainRule checks the pattern is valid | ||
type AwsAcmCertificateInvalidCertificateChainRule struct { | ||
resourceType string | ||
attributeName string | ||
max int | ||
min int | ||
pattern *regexp.Regexp | ||
} | ||
|
||
// NewAwsAcmCertificateInvalidCertificateChainRule returns new rule with default attributes | ||
func NewAwsAcmCertificateInvalidCertificateChainRule() *AwsAcmCertificateInvalidCertificateChainRule { | ||
return &AwsAcmCertificateInvalidCertificateChainRule{ | ||
resourceType: "aws_acm_certificate", | ||
attributeName: "certificate_chain", | ||
max: 2097152, | ||
min: 1, | ||
pattern: regexp.MustCompile(`^(-{5}BEGIN CERTIFICATE-{5}\x{000D}?\x{000A}([A-Za-z0-9/+]{64}\x{000D}?\x{000A})*[A-Za-z0-9/+]{1,64}={0,2}\x{000D}?\x{000A}-{5}END CERTIFICATE-{5}\x{000D}?\x{000A})*-{5}BEGIN CERTIFICATE-{5}\x{000D}?\x{000A}([A-Za-z0-9/+]{64}\x{000D}?\x{000A})*[A-Za-z0-9/+]{1,64}={0,2}\x{000D}?\x{000A}-{5}END CERTIFICATE-{5}(\x{000D}?\x{000A})?$`), | ||
} | ||
} | ||
|
||
// Name returns the rule name | ||
func (r *AwsAcmCertificateInvalidCertificateChainRule) Name() string { | ||
return "aws_acm_certificate_invalid_certificate_chain" | ||
} | ||
|
||
// Enabled returns whether the rule is enabled by default | ||
func (r *AwsAcmCertificateInvalidCertificateChainRule) Enabled() bool { | ||
return true | ||
} | ||
|
||
// Type returns the rule severity | ||
func (r *AwsAcmCertificateInvalidCertificateChainRule) Type() string { | ||
return issue.ERROR | ||
} | ||
|
||
// Link returns the rule reference link | ||
func (r *AwsAcmCertificateInvalidCertificateChainRule) Link() string { | ||
return "" | ||
} | ||
|
||
// Check checks the pattern is valid | ||
func (r *AwsAcmCertificateInvalidCertificateChainRule) Check(runner *tflint.Runner) error { | ||
log.Printf("[INFO] Check `%s` rule for `%s` runner", r.Name(), runner.TFConfigPath()) | ||
|
||
return runner.WalkResourceAttributes(r.resourceType, r.attributeName, func(attribute *hcl.Attribute) error { | ||
var val string | ||
err := runner.EvaluateExpr(attribute.Expr, &val) | ||
|
||
return runner.EnsureNoError(err, func() error { | ||
if len(val) > r.max { | ||
runner.EmitIssue( | ||
r, | ||
"certificate_chain must be 2097152 characters or less", | ||
attribute.Expr.Range(), | ||
) | ||
} | ||
if len(val) < r.min { | ||
runner.EmitIssue( | ||
r, | ||
"certificate_chain must be 1 characters or higher", | ||
attribute.Expr.Range(), | ||
) | ||
} | ||
if !r.pattern.MatchString(val) { | ||
runner.EmitIssue( | ||
r, | ||
`certificate_chain does not match valid pattern ^(-{5}BEGIN CERTIFICATE-{5}\x{000D}?\x{000A}([A-Za-z0-9/+]{64}\x{000D}?\x{000A})*[A-Za-z0-9/+]{1,64}={0,2}\x{000D}?\x{000A}-{5}END CERTIFICATE-{5}\x{000D}?\x{000A})*-{5}BEGIN CERTIFICATE-{5}\x{000D}?\x{000A}([A-Za-z0-9/+]{64}\x{000D}?\x{000A})*[A-Za-z0-9/+]{1,64}={0,2}\x{000D}?\x{000A}-{5}END CERTIFICATE-{5}(\x{000D}?\x{000A})?$`, | ||
attribute.Expr.Range(), | ||
) | ||
} | ||
return nil | ||
}) | ||
}) | ||
} |
Oops, something went wrong.