cfn-nag 0.7.14 → 0.8.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (69) hide show
  1. checksums.yaml +4 -4
  2. data/bin/cfn_nag_rules +2 -2
  3. data/bin/spcm_scan +1 -1
  4. data/lib/cfn-nag/cfn_nag.rb +10 -10
  5. data/lib/cfn-nag/cfn_nag_config.rb +3 -3
  6. data/lib/cfn-nag/cfn_nag_executor.rb +5 -5
  7. data/lib/cfn-nag/cli_options.rb +15 -5
  8. data/lib/cfn-nag/custom_rules/AlexaASKSkillAuthenticationConfigurationClientSecretRule.rb +1 -1
  9. data/lib/cfn-nag/custom_rules/AlexaASKSkillAuthenticationConfigurationRefreshTokenRule.rb +1 -1
  10. data/lib/cfn-nag/custom_rules/AmazonMQBrokerUsersPasswordRule.rb +1 -1
  11. data/lib/cfn-nag/custom_rules/AmplifyAppAccessTokenRule.rb +2 -2
  12. data/lib/cfn-nag/custom_rules/AmplifyAppBasicAuthConfigPasswordRule.rb +2 -2
  13. data/lib/cfn-nag/custom_rules/AmplifyAppOauthTokenRule.rb +2 -2
  14. data/lib/cfn-nag/custom_rules/AmplifyBranchBasicAuthConfigPasswordRule.rb +2 -2
  15. data/lib/cfn-nag/custom_rules/ApiGatewayAccessLoggingRule.rb +1 -1
  16. data/lib/cfn-nag/custom_rules/ApiGatewayCacheEncryptedRule.rb +1 -1
  17. data/lib/cfn-nag/custom_rules/ApiGatewayMethodAuthorizationTypeRule.rb +1 -1
  18. data/lib/cfn-nag/custom_rules/AppStreamDirectoryConfigServiceAccountCredentialsAccountPasswordRule.rb +3 -3
  19. data/lib/cfn-nag/custom_rules/CodePipelineWebhookAuthenticationConfigurationSecretTokenRule.rb +2 -2
  20. data/lib/cfn-nag/custom_rules/CognitoIdentityPoolAllowUnauthenticatedIdentitiesRule.rb +1 -1
  21. data/lib/cfn-nag/custom_rules/DMSEndpointMongoDbSettingsPasswordRule.rb +2 -2
  22. data/lib/cfn-nag/custom_rules/DMSEndpointPasswordRule.rb +2 -2
  23. data/lib/cfn-nag/custom_rules/DirectoryServiceMicrosoftADPasswordRule.rb +2 -2
  24. data/lib/cfn-nag/custom_rules/DirectoryServiceSimpleADPasswordRule.rb +2 -2
  25. data/lib/cfn-nag/custom_rules/DocDBDBClusterMasterUserPasswordRule.rb +2 -2
  26. data/lib/cfn-nag/custom_rules/EC2NetworkAclEntryProtocolRule.rb +3 -7
  27. data/lib/cfn-nag/custom_rules/EKSClusterEncryptionRule.rb +1 -3
  28. data/lib/cfn-nag/custom_rules/EMRClusterKerberosAttributesADDomainJoinPasswordRule.rb +2 -2
  29. data/lib/cfn-nag/custom_rules/EMRClusterKerberosAttributesCrossRealmTrustPrincipalPasswordRule.rb +3 -3
  30. data/lib/cfn-nag/custom_rules/EMRClusterKerberosAttributesKdcAdminPasswordRule.rb +2 -2
  31. data/lib/cfn-nag/custom_rules/ElastiCacheReplicationGroupAuthTokenRule.rb +2 -2
  32. data/lib/cfn-nag/custom_rules/GameLiftFleetInboundPortRangeRule.rb +2 -0
  33. data/lib/cfn-nag/custom_rules/IAMUserLoginProfilePasswordRule.rb +2 -2
  34. data/lib/cfn-nag/custom_rules/IamUserLoginProfilePasswordResetRule.rb +4 -6
  35. data/lib/cfn-nag/custom_rules/KMSKeyWildcardPrincipalRule.rb +1 -1
  36. data/lib/cfn-nag/custom_rules/KinesisFirehoseDeliveryStreamRedshiftDestinationConfigurationPasswordRule.rb +3 -3
  37. data/lib/cfn-nag/custom_rules/KinesisFirehoseDeliveryStreamSplunkDestinationConfigurationHECTokenRule.rb +3 -3
  38. data/lib/cfn-nag/custom_rules/KinesisStreamStreamEncryptionRule.rb +3 -5
  39. data/lib/cfn-nag/custom_rules/LambdaPermissionEventSourceTokenRule.rb +2 -2
  40. data/lib/cfn-nag/custom_rules/LambdaPermissionInvokeFunctionActionRule.rb +1 -1
  41. data/lib/cfn-nag/custom_rules/ManagedBlockchainMemberMemberFabricConfigurationAdminPasswordRule.rb +4 -7
  42. data/lib/cfn-nag/custom_rules/OpsWorksAppAppSourcePasswordRule.rb +2 -2
  43. data/lib/cfn-nag/custom_rules/OpsWorksAppSslConfigurationPrivateKeyRule.rb +2 -2
  44. data/lib/cfn-nag/custom_rules/OpsWorksStackCustomCookbooksSourcePasswordRule.rb +2 -2
  45. data/lib/cfn-nag/custom_rules/OpsWorksStackRdsDbInstancesDbPasswordRule.rb +2 -2
  46. data/lib/cfn-nag/custom_rules/PinpointAPNSChannelPrivateKeyRule.rb +2 -2
  47. data/lib/cfn-nag/custom_rules/PinpointAPNSChannelTokenKeyRule.rb +2 -2
  48. data/lib/cfn-nag/custom_rules/PinpointAPNSSandboxChannelPrivateKeyRule.rb +2 -2
  49. data/lib/cfn-nag/custom_rules/PinpointAPNSSandboxChannelTokenKeyRule.rb +2 -2
  50. data/lib/cfn-nag/custom_rules/PinpointAPNSVoipChannelPrivateKeyRule.rb +2 -2
  51. data/lib/cfn-nag/custom_rules/PinpointAPNSVoipChannelTokenKeyRule.rb +2 -2
  52. data/lib/cfn-nag/custom_rules/PinpointAPNSVoipSandboxChannelPrivateKeyRule.rb +2 -2
  53. data/lib/cfn-nag/custom_rules/PinpointAPNSVoipSandboxChannelTokenKeyRule.rb +2 -2
  54. data/lib/cfn-nag/custom_rules/RDSDBClusterMasterUserPasswordRule.rb +2 -2
  55. data/lib/cfn-nag/custom_rules/RDSDBInstanceMasterUserPasswordRule.rb +2 -2
  56. data/lib/cfn-nag/custom_rules/RDSDBInstanceMasterUsernameRule.rb +2 -2
  57. data/lib/cfn-nag/custom_rules/RedshiftClusterMasterUserPasswordRule.rb +2 -2
  58. data/lib/cfn-nag/custom_rules/ResourceWithExplicitNameRule.rb +1 -1
  59. data/lib/cfn-nag/custom_rules/SecretsManagerSecretKmsKeyIdRule.rb +1 -1
  60. data/lib/cfn-nag/custom_rules/SecurityGroupIngressOpenToWorldRule.rb +1 -1
  61. data/lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb +1 -1
  62. data/lib/cfn-nag/custom_rules/SecurityGroupMissingEgressRule.rb +1 -1
  63. data/lib/cfn-nag/custom_rules/SecurityGroupRuleDescriptionRule.rb +2 -2
  64. data/lib/cfn-nag/deny_list_loader.rb +43 -0
  65. data/lib/cfn-nag/iam_complexity_metric/spcm.rb +3 -3
  66. data/lib/cfn-nag/util/enforce_reference_parameter.rb +1 -1
  67. data/lib/cfn-nag/violation_filtering.rb +9 -9
  68. metadata +5 -5
  69. data/lib/cfn-nag/blacklist_loader.rb +0 -43
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 70f335d0bebdb4b78e063ab81ebf8f663eaedc860a6b5a363f4c507add26264b
4
- data.tar.gz: 2389c3d05c0b438bfbea87bcb9502951b5c9c854bf267a71bce9e129ac4b22e8
3
+ metadata.gz: 8aceb287830823e0d3aa5f6254e14e5d12fd5405c48ec9d41ce1e098023320cf
4
+ data.tar.gz: 8137ee2a1a7282e2025d6659229b1a9d1eb6e01a7db51c727dd6d37f0acda745
5
5
  SHA512:
6
- metadata.gz: ff20a037163ea01ecfe42bec632589833f3ab920803831c716c824ce2d34a35ffd009f2c31feb7ec5cb199cfc066ac056681b48c236879cbbebd1709c718601b
7
- data.tar.gz: c5ea9a1f1010512bf6ba8705977f1f468f8669955a785dc46a518d422662b4bfcdea1e67fdd4c8d5ff6e154a376a8a8dd0900804dfb41c03eeaa9220e38827bd
6
+ metadata.gz: 9000f354e1fc834f08d6688580f8f79fa0846a4d2ff9c54bdc5995eae0fd3cad8a7f003178565da1209d1067585e1ba6d841f90c6e991891ad0b0a5b8714b98d
7
+ data.tar.gz: 8c726d52d37b174b91c3eb0abe6c97cd946ce324ad20bf63d75bc176661aa9af782d8a9e69a589368d4859fbb68bdd73af541e27e9020aba267756cf1de6187f
data/bin/cfn_nag_rules CHANGED
@@ -27,12 +27,12 @@ end
27
27
 
28
28
  profile_definition = nil
29
29
  unless opts[:profile_path].nil?
30
- profile_definition = IO.read(opts[:profile_path])
30
+ profile_definition = File.read(opts[:profile_path])
31
31
  end
32
32
 
33
33
  rule_repository_definitions = []
34
34
  opts[:rule_repository]&.each do |rule_repository|
35
- rule_repository_definitions << IO.read(rule_repository)
35
+ rule_repository_definitions << File.read(rule_repository)
36
36
  end
37
37
 
38
38
  rule_dumper = CfnNagRuleDumper.new(profile_definition: profile_definition,
data/bin/spcm_scan CHANGED
@@ -41,7 +41,7 @@ end
41
41
 
42
42
  def read_conditionally(path)
43
43
  unless path.nil?
44
- IO.read(path)
44
+ File.read(path)
45
45
  end
46
46
  end
47
47
 
@@ -55,8 +55,8 @@ class CfnNag
55
55
  parameter_values_path: nil,
56
56
  condition_values_path: nil,
57
57
  template_pattern: DEFAULT_TEMPLATE_PATTERN)
58
- parameter_values_string = parameter_values_path.nil? ? nil : IO.read(parameter_values_path)
59
- condition_values_string = condition_values_path.nil? ? nil : IO.read(condition_values_path)
58
+ parameter_values_string = parameter_values_path.nil? ? nil : File.read(parameter_values_path)
59
+ condition_values_string = condition_values_path.nil? ? nil : File.read(condition_values_path)
60
60
 
61
61
  templates = TemplateDiscovery.new.discover_templates(input_json_path: input_path,
62
62
  template_pattern: template_pattern)
@@ -64,7 +64,7 @@ class CfnNag
64
64
  templates.each do |template|
65
65
  aggregate_results << {
66
66
  filename: template,
67
- file_results: audit(cloudformation_string: IO.read(template),
67
+ file_results: audit(cloudformation_string: File.read(template),
68
68
  parameter_values_string: parameter_values_string,
69
69
  condition_values_string: condition_values_string)
70
70
  }
@@ -93,7 +93,7 @@ class CfnNag
93
93
  @config.custom_rule_loader.rule_definitions
94
94
  )
95
95
 
96
- violations = filter_violations_by_blacklist_and_profile(violations)
96
+ violations = filter_violations_by_deny_list_and_profile(violations)
97
97
  violations = mark_line_numbers(violations, cfn_model)
98
98
  rescue RuleRepoException, Psych::SyntaxError, ParserError => fatal_error
99
99
  violations << fatal_violation(fatal_error.to_s)
@@ -127,21 +127,21 @@ class CfnNag
127
127
  violations
128
128
  end
129
129
 
130
- def filter_violations_by_blacklist_and_profile(violations)
130
+ def filter_violations_by_deny_list_and_profile(violations)
131
131
  violations = filter_violations_by_profile(
132
132
  profile_definition: @config.profile_definition,
133
133
  rule_definitions: @config.custom_rule_loader.rule_definitions,
134
134
  violations: violations
135
135
  )
136
136
 
137
- # this must come after - blacklist should always win
138
- filter_violations_by_blacklist(
139
- blacklist_definition: @config.blacklist_definition,
137
+ # this must come after - deny list should always win
138
+ filter_violations_by_deny_list(
139
+ deny_list_definition: @config.deny_list_definition,
140
140
  rule_definitions: @config.custom_rule_loader.rule_definitions,
141
141
  violations: violations
142
142
  )
143
- rescue StandardError => blacklist_or_profile_parse_error
144
- violations << fatal_violation(blacklist_or_profile_parse_error.to_s)
143
+ rescue StandardError => deny_list_or_profile_parse_error
144
+ violations << fatal_violation(deny_list_or_profile_parse_error.to_s)
145
145
  violations
146
146
  end
147
147
 
@@ -3,7 +3,7 @@
3
3
  class CfnNagConfig
4
4
  # rubocop:disable Metrics/ParameterLists
5
5
  def initialize(profile_definition: nil,
6
- blacklist_definition: nil,
6
+ deny_list_definition: nil,
7
7
  rule_directory: nil,
8
8
  allow_suppression: true,
9
9
  print_suppression: false,
@@ -21,7 +21,7 @@ class CfnNagConfig
21
21
  rule_repository_definitions: rule_repository_definitions
22
22
  )
23
23
  @profile_definition = profile_definition
24
- @blacklist_definition = blacklist_definition
24
+ @deny_list_definition = deny_list_definition
25
25
  @fail_on_warnings = fail_on_warnings
26
26
  @rule_repositories = rule_repositories
27
27
  @rule_arguments = rule_arguments
@@ -29,6 +29,6 @@ class CfnNagConfig
29
29
  end
30
30
  # rubocop:enable Metrics/ParameterLists
31
31
 
32
- attr_reader :rule_arguments, :rule_directory, :custom_rule_loader, :profile_definition, :blacklist_definition, \
32
+ attr_reader :rule_arguments, :rule_directory, :custom_rule_loader, :profile_definition, :deny_list_definition, \
33
33
  :fail_on_warnings, :rule_repositories, :ignore_fatal
34
34
  end
@@ -7,7 +7,7 @@ require 'cfn-nag/cfn_nag_config'
7
7
  class CfnNagExecutor
8
8
  def initialize
9
9
  @profile_definition = nil
10
- @blacklist_definition = nil
10
+ @deny_list_definition = nil
11
11
  @parameter_values_string = nil
12
12
  @condition_values_string = nil
13
13
  @rule_repository_definitions = []
@@ -89,7 +89,7 @@ class CfnNagExecutor
89
89
  def execute_io_options(opts)
90
90
  @profile_definition = read_conditionally(opts[:profile_path])
91
91
 
92
- @blacklist_definition = read_conditionally(opts[:blacklist_path])
92
+ @deny_list_definition = read_conditionally(opts[:deny_list_path]) || read_conditionally(opts[:blacklist_path])
93
93
 
94
94
  @parameter_values_string = read_conditionally(opts[:parameter_values_path])
95
95
 
@@ -98,13 +98,13 @@ class CfnNagExecutor
98
98
  @rule_arguments_string = read_conditionally(opts[:rule_arguments_path])
99
99
 
100
100
  opts[:rule_repository]&.each do |rule_repository|
101
- @rule_repository_definitions << IO.read(rule_repository)
101
+ @rule_repository_definitions << File.read(rule_repository)
102
102
  end
103
103
  end
104
104
 
105
105
  def read_conditionally(path)
106
106
  unless path.nil?
107
- IO.read(path)
107
+ File.read(path)
108
108
  end
109
109
  end
110
110
 
@@ -122,7 +122,7 @@ class CfnNagExecutor
122
122
  def cfn_nag_config(opts)
123
123
  CfnNagConfig.new(
124
124
  profile_definition: @profile_definition,
125
- blacklist_definition: @blacklist_definition,
125
+ deny_list_definition: @deny_list_definition,
126
126
  rule_directory: opts[:rule_directory],
127
127
  allow_suppression: opts[:allow_suppression],
128
128
  print_suppression: opts[:print_suppression],
@@ -5,8 +5,8 @@ require 'optimist'
5
5
  # rubocop:disable Metrics/ClassLength
6
6
  class Options
7
7
  @custom_rule_exceptions_message = 'Isolate custom rule exceptions - just ' \
8
- 'emit the exception without stack trace ' \
9
- 'and keep chugging'
8
+ 'emit the exception without stack trace ' \
9
+ 'and keep chugging'
10
10
 
11
11
  @version = Gem::Specification.find_by_name('cfn-nag').version
12
12
 
@@ -25,7 +25,7 @@ class Options
25
25
  # rubocop:disable Metrics/MethodLength
26
26
  def self.file_options
27
27
  options_message = '[options] <cloudformation template path ...>|' \
28
- '<cloudformation template in STDIN>'
28
+ '<cloudformation template in STDIN>'
29
29
  custom_rule_exceptions_message = @custom_rule_exceptions_message
30
30
  version = @version
31
31
 
@@ -58,8 +58,13 @@ class Options
58
58
  type: :string,
59
59
  required: false,
60
60
  default: nil
61
+ opt :deny_list_path,
62
+ 'Path to a deny list file',
63
+ type: :string,
64
+ required: false,
65
+ default: nil
61
66
  opt :blacklist_path,
62
- 'Path to a blacklist file',
67
+ '(Deprecated) Path to a deny list file',
63
68
  type: :string,
64
69
  required: false,
65
70
  default: nil
@@ -145,8 +150,13 @@ class Options
145
150
  type: :string,
146
151
  required: false,
147
152
  default: nil
153
+ opt :deny_list_path,
154
+ 'Path to a deny list file',
155
+ type: :string,
156
+ required: false,
157
+ default: nil
148
158
  opt :blacklist_path,
149
- 'Path to a blacklist file',
159
+ '(Deprecated) Path to a deny list file',
150
160
  type: :string,
151
161
  required: false,
152
162
  default: nil
@@ -8,7 +8,7 @@ require_relative 'base'
8
8
  class AlexaASKSkillAuthenticationConfigurationClientSecretRule < BaseRule
9
9
  def rule_text
10
10
  'Alexa ASK Skill AuthenticationConfiguration ClientSecret must not be ' \
11
- 'a plaintext string or a Ref to a NoEcho Parameter with a Default value.'
11
+ 'a plaintext string or a Ref to a NoEcho Parameter with a Default value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -8,7 +8,7 @@ require_relative 'base'
8
8
  class AlexaASKSkillAuthenticationConfigurationRefreshTokenRule < BaseRule
9
9
  def rule_text
10
10
  'Alexa ASK Skill AuthenticationConfiguration RefreshToken must not be ' \
11
- 'a plaintext string or a Ref to a NoEcho Parameter with a Default value.'
11
+ 'a plaintext string or a Ref to a NoEcho Parameter with a Default value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -6,7 +6,7 @@ require_relative 'sub_property_with_list_password_base_rule'
6
6
  class AmazonMQBrokerUsersPasswordRule < SubPropertyWithListPasswordBaseRule
7
7
  def rule_text
8
8
  'AmazonMQ Broker Users Password must not be a plaintext string or a Ref to a Parameter with a Default value. ' \
9
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class AmplifyAppAccessTokenRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Amplify App AccessToken must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class AmplifyAppBasicAuthConfigPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Amplify App BasicAuthConfig Password must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class AmplifyAppOauthTokenRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Amplify App OauthToken must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class AmplifyBranchBasicAuthConfigPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Amplify Branch BasicAuthConfig Password must not be a plaintext ' \
9
- 'string or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'string or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,7 +6,7 @@ require_relative 'base'
6
6
  class ApiGatewayAccessLoggingRule < BaseRule
7
7
  def rule_text
8
8
  'ApiGateway Deployment resource should have AccessLogSetting property configured when creating an ' \
9
- 'API Stage itself (through specifying the StageName and StageDescription properties).'
9
+ 'API Stage itself (through specifying the StageName and StageDescription properties).'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -6,7 +6,7 @@ require_relative 'base'
6
6
  class ApiGatewayCacheEncryptedRule < BaseRule
7
7
  def rule_text
8
8
  'ApiGateway Deployment should have cache data encryption enabled when caching is enabled' \
9
- ' in StageDescription properties'
9
+ ' in StageDescription properties'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -6,7 +6,7 @@ require_relative 'base'
6
6
  class ApiGatewayMethodAuthorizationTypeRule < BaseRule
7
7
  def rule_text
8
8
  "AWS::ApiGateway::Method should not have AuthorizationType set to 'NONE' unless it is of " \
9
- 'HttpMethod: OPTIONS.'
9
+ 'HttpMethod: OPTIONS.'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -6,9 +6,9 @@ require_relative 'password_base_rule'
6
6
  class AppStreamDirectoryConfigServiceAccountCredentialsAccountPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'AppStream DirectoryConfig ServiceAccountCredentials AccountPassword ' \
9
- 'must not be a plaintext string or a Ref to a Parameter ' \
10
- 'with a Default value. ' \
11
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'must not be a plaintext string or a Ref to a Parameter ' \
10
+ 'with a Default value. ' \
11
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class CodePipelineWebhookAuthenticationConfigurationSecretTokenRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'CodePipeline Webhook AuthenticationConfiguration SecretToken must not be ' \
9
- 'a plaintext string or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'a plaintext string or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -7,7 +7,7 @@ require_relative 'base'
7
7
  class CognitoIdentityPoolAllowUnauthenticatedIdentitiesRule < BaseRule
8
8
  def rule_text
9
9
  'AWS::Cognito::IdentityPool AllowUnauthenticatedIdentities property should be false ' \
10
- 'but CAN be true if proper restrictive IAM roles and permissions are established for unauthenticated users.'
10
+ 'but CAN be true if proper restrictive IAM roles and permissions are established for unauthenticated users.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class DMSEndpointMongoDbSettingsPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'DMS Endpoint MongoDbSettings Password must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class DMSEndpointPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'DMS Endpoint password must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -7,8 +7,8 @@ require_relative 'password_base_rule'
7
7
  class DirectoryServiceMicrosoftADPasswordRule < PasswordBaseRule
8
8
  def rule_text
9
9
  'Directory Service Microsoft AD password must not be a plaintext string ' \
10
- 'or a Ref to a Parameter with a Default value. ' \
11
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
10
+ 'or a Ref to a Parameter with a Default value. ' \
11
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -7,8 +7,8 @@ require_relative 'password_base_rule'
7
7
  class DirectoryServiceSimpleADPasswordRule < PasswordBaseRule
8
8
  def rule_text
9
9
  'DirectoryService SimpleAD password must not be a plaintext string ' \
10
- 'or a Ref to a Parameter with a Default value. ' \
11
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
10
+ 'or a Ref to a Parameter with a Default value. ' \
11
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class DocDBDBClusterMasterUserPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'DocDB DB Cluster master user password must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,7 +6,7 @@ require_relative 'base'
6
6
  class EC2NetworkAclEntryProtocolRule < BaseRule
7
7
  def rule_text
8
8
  'To avoid opening all ports for Allow rules, EC2 NetworkACL Entry Protocol should be either 6 (for TCP), 17 ' \
9
- '(for UDP), 1 (for ICMP), or 58 (for ICMPv6, which must include an IPv6 CIDR block, ICMP type, and code).'
9
+ '(for UDP), 1 (for ICMP), or 58 (for ICMPv6, which must include an IPv6 CIDR block, ICMP type, and code).'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -53,12 +53,8 @@ class EC2NetworkAclEntryProtocolRule < BaseRule
53
53
 
54
54
  def violating_network_acl_entries?(network_acl_entry)
55
55
  if rule_action_allow?(network_acl_entry)
56
- if tcp_udp_icmp_protocol?(network_acl_entry) ||
57
- icmpv6_protocol?(network_acl_entry)
58
- false
59
- else
60
- true
61
- end
56
+ !(tcp_udp_icmp_protocol?(network_acl_entry) ||
57
+ icmpv6_protocol?(network_acl_entry))
62
58
  end
63
59
  end
64
60
  end
@@ -18,9 +18,7 @@ class EKSClusterEncryptionRule < BaseRule
18
18
 
19
19
  def audit_impl(cfn_model)
20
20
  violating_clusters = cfn_model.resources_by_type('AWS::EKS::Cluster').select do |cluster|
21
- if cluster.encryptionConfig.nil?
22
- true
23
- elsif violating_configs?(cluster)
21
+ if cluster.encryptionConfig.nil? || violating_configs?(cluster)
24
22
  true
25
23
  else
26
24
  violating_providers?(cluster)
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class EMRClusterKerberosAttributesADDomainJoinPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'EMR Cluster KerberosAttributes AD Domain JoinPassword must not be a ' \
9
- 'plaintext string or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'plaintext string or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,9 +6,9 @@ require_relative 'password_base_rule'
6
6
  class EMRClusterKerberosAttributesCrossRealmTrustPrincipalPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'EMR Cluster KerberosAttributes CrossRealmTrustPrincipal Password must ' \
9
- 'not be a plaintext string or a Ref to a Parameter with a ' \
10
- 'Default value. ' \
11
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'not be a plaintext string or a Ref to a Parameter with a ' \
10
+ 'Default value. ' \
11
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class EMRClusterKerberosAttributesKdcAdminPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'EMR Cluster KerberosAttributes KdcAdmin Password must not be a ' \
9
- 'plaintext string or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'plaintext string or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class ElastiCacheReplicationGroupAuthTokenRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'ElastiCache ReplicationGroup AuthToken must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -18,6 +18,8 @@ class GameLiftFleetInboundPortRangeRule < BaseRule
18
18
 
19
19
  def audit_impl(cfn_model)
20
20
  violating_gamelift_fleets = cfn_model.resources_by_type('AWS::GameLift::Fleet').select do |gamelift_fleet|
21
+ next false if gamelift_fleet.eC2InboundPermissions.nil?
22
+
21
23
  violating_permissions = gamelift_fleet.eC2InboundPermissions.select do |permission|
22
24
  # Cast to strings incase template provided mixed types
23
25
  permission['FromPort'].to_s != permission['ToPort'].to_s
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class IAMUserLoginProfilePasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'IAM User LoginProfile Password must not be a plaintext string or ' \
9
- 'a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -29,9 +29,7 @@ class IamUserLoginProfilePasswordResetRule < BaseRule
29
29
 
30
30
  def iam_user_password_reset_required_key?(login_profile)
31
31
  if login_profile.key? 'PasswordResetRequired'
32
- if login_profile['PasswordResetRequired'].nil?
33
- true
34
- elsif not_truthy?(login_profile['PasswordResetRequired'])
32
+ if login_profile['PasswordResetRequired'].nil? || not_truthy?(login_profile['PasswordResetRequired'])
35
33
  true
36
34
  end
37
35
  else
@@ -40,10 +38,10 @@ class IamUserLoginProfilePasswordResetRule < BaseRule
40
38
  end
41
39
 
42
40
  def violating_iam_users?(iam_user)
43
- if !iam_user.loginProfile.nil?
44
- iam_user_password_reset_required_key?(iam_user.loginProfile)
45
- else
41
+ if iam_user.loginProfile.nil?
46
42
  false
43
+ else
44
+ iam_user_password_reset_required_key?(iam_user.loginProfile)
47
45
  end
48
46
  end
49
47
  end
@@ -6,7 +6,7 @@ require_relative 'base'
6
6
  class KMSKeyWildcardPrincipalRule < BaseRule
7
7
  def rule_text
8
8
  'KMS key should not allow * principal ' \
9
- '(https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html)'
9
+ '(https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html)'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -6,9 +6,9 @@ require_relative 'password_base_rule'
6
6
  class KinesisFirehoseDeliveryStreamRedshiftDestinationConfigurationPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Kinesis Firehose DeliveryStream RedshiftDestinationConfiguration Password ' \
9
- 'must not be a plaintext string or a Ref to a Parameter with a ' \
10
- 'Default value. ' \
11
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
9
+ 'must not be a plaintext string or a Ref to a Parameter with a ' \
10
+ 'Default value. ' \
11
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -6,9 +6,9 @@ require_relative 'password_base_rule'
6
6
  class KinesisFirehoseDeliveryStreamSplunkDestinationConfigurationHECTokenRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Kinesis Firehose DeliveryStream SplunkDestinationConfiguration HECToken ' \
9
- 'must not be a plaintext string or a Ref to a Parameter with a ' \
10
- 'Default value. ' \
11
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'must not be a plaintext string or a Ref to a Parameter with a ' \
10
+ 'Default value. ' \
11
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -27,11 +27,9 @@ class KinesisStreamStreamEncryptionRule < BaseRule
27
27
  private
28
28
 
29
29
  def violating_kinesis_streams?(kinesis_stream)
30
- if kinesis_stream.streamEncryption.nil?
31
- true
32
- elsif kinesis_stream.streamEncryption['EncryptionType'].nil?
33
- true
34
- elsif kinesis_stream.streamEncryption['KeyId'].nil?
30
+ if kinesis_stream.streamEncryption.nil? ||
31
+ kinesis_stream.streamEncryption['EncryptionType'].nil? ||
32
+ kinesis_stream.streamEncryption['KeyId'].nil?
35
33
  true
36
34
  else
37
35
  kinesis_stream.streamEncryption['EncryptionType'] == 'NONE'
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class LambdaPermissionEventSourceTokenRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Lambda Permission EventSourceToken must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,7 +6,7 @@ require_relative 'base'
6
6
  class LambdaPermissionInvokeFunctionActionRule < BaseRule
7
7
  def rule_text
8
8
  'Lambda permission beside InvokeFunction might not be what you want? ' \
9
- 'Not sure!?'
9
+ 'Not sure!?'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -8,7 +8,7 @@ require_relative 'base'
8
8
  class ManagedBlockchainMemberMemberFabricConfigurationAdminPasswordRule < BaseRule
9
9
  def rule_text
10
10
  'ManagedBlockchain Member MemberFabricConfiguration AdminPasswordRule must ' \
11
- 'not be a plaintext string or a Ref to a NoEcho Parameter with a Default value.'
11
+ 'not be a plaintext string or a Ref to a NoEcho Parameter with a Default value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -42,14 +42,11 @@ class ManagedBlockchainMemberMemberFabricConfigurationAdminPasswordRule < BaseRu
42
42
  # 'MemberFabricConfiguration'
43
43
  # 'AdminPassword'
44
44
  def password_property_does_not_exist(member)
45
- if member.memberConfiguration['MemberFrameworkConfiguration'].nil?
46
- true
47
- elsif member.memberConfiguration['MemberFrameworkConfiguration']['MemberFabricConfiguration'].nil?
48
- true
49
- elsif member.memberConfiguration['MemberFrameworkConfiguration']['MemberFabricConfiguration']['AdminPassword'].nil?
45
+ if member.memberConfiguration['MemberFrameworkConfiguration'].nil? ||
46
+ member.memberConfiguration['MemberFrameworkConfiguration']['MemberFabricConfiguration'].nil?
50
47
  true
51
48
  else
52
- false
49
+ member.memberConfiguration['MemberFrameworkConfiguration']['MemberFabricConfiguration']['AdminPassword'].nil?
53
50
  end
54
51
  end
55
52
  end
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class OpsWorksAppAppSourcePasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'OpsWorks App AppSource Password must not be a plaintext ' \
9
- 'string or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
9
+ 'string or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class OpsWorksAppSslConfigurationPrivateKeyRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'OpsWorks App SslConfiguration PrivateKey must not be a plaintext ' \
9
- 'string or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'string or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class OpsWorksStackCustomCookbooksSourcePasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'OpsWorks Stack CustomCookbooksSource Password must not be a plaintext ' \
9
- 'string or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
9
+ 'string or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'sub_property_with_list_password_base_rule'
6
6
  class OpsWorksStackRdsDbInstancesDbPasswordRule < SubPropertyWithListPasswordBaseRule
7
7
  def rule_text
8
8
  'OpsWorks Stack RDS DbInstance DbPassword must not be a plaintext string '\
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class PinpointAPNSChannelPrivateKeyRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Pinpoint APNSChannel PrivateKey must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class PinpointAPNSChannelTokenKeyRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Pinpoint APNSChannel TokenKey must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class PinpointAPNSSandboxChannelPrivateKeyRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Pinpoint APNSSandboxChannel PrivateKey must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class PinpointAPNSSandboxChannelTokenKeyRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Pinpoint APNSSandboxChannel TokenKey must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class PinpointAPNSVoipChannelPrivateKeyRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Pinpoint APNSVoipChannel PrivateKey must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class PinpointAPNSVoipChannelTokenKeyRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Pinpoint APNSChannel TokenKey must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class PinpointAPNSVoipSandboxChannelPrivateKeyRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Pinpoint APNSVoipSandboxChannel PrivateKey must not be a plaintext ' \
9
- 'string or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'string or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class PinpointAPNSVoipSandboxChannelTokenKeyRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Pinpoint APNSVoipSandboxChannel TokenKey must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class RDSDBClusterMasterUserPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'RDS DB Cluster master user password must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class RDSDBInstanceMasterUserPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'RDS instance master user password must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -7,8 +7,8 @@ require_relative 'password_base_rule'
7
7
  class RDSDBInstanceMasterUsernameRule < PasswordBaseRule
8
8
  def rule_text
9
9
  'RDS instance master username must not be a plaintext string ' \
10
- 'or a Ref to a Parameter with a Default value. ' \
11
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
10
+ 'or a Ref to a Parameter with a Default value. ' \
11
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager value.'
12
12
  end
13
13
 
14
14
  def rule_type
@@ -6,8 +6,8 @@ require_relative 'password_base_rule'
6
6
  class RedshiftClusterMasterUserPasswordRule < PasswordBaseRule
7
7
  def rule_text
8
8
  'Redshift Cluster master user password must not be a plaintext string ' \
9
- 'or a Ref to a Parameter with a Default value. ' \
10
- 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
9
+ 'or a Ref to a Parameter with a Default value. ' \
10
+ 'Can be Ref to a NoEcho Parameter without a Default, or a dynamic reference to a secretsmanager/ssm-secure value.'
11
11
  end
12
12
 
13
13
  def rule_type
@@ -26,7 +26,7 @@ class ResourceWithExplicitNameRule < BaseRule
26
26
 
27
27
  def rule_text
28
28
  'Resource found with an explicit name, this disallows updates that ' \
29
- 'require replacement of this resource'
29
+ 'require replacement of this resource'
30
30
  end
31
31
 
32
32
  def rule_type
@@ -6,7 +6,7 @@ require_relative 'boolean_base_rule'
6
6
  class SecretsManagerSecretKmsKeyIdRule < BooleanBaseRule
7
7
  def rule_text
8
8
  'Secrets Manager Secret should explicitly specify KmsKeyId.' \
9
- ' Besides control of the key this will allow the secret to be shared cross-account'
9
+ ' Besides control of the key this will allow the secret to be shared cross-account'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -9,7 +9,7 @@ class SecurityGroupIngressOpenToWorldRule < BaseRule
9
9
 
10
10
  def rule_text
11
11
  'Security Groups found with cidr open to world on ingress. This should ' \
12
- 'never be true on instance. Permissible on ELB'
12
+ 'never be true on instance. Permissible on ELB'
13
13
  end
14
14
 
15
15
  def rule_type
@@ -6,7 +6,7 @@ require_relative 'base'
6
6
  class SecurityGroupIngressPortRangeRule < BaseRule
7
7
  def rule_text
8
8
  'Security Groups found ingress with port range instead of just a single ' \
9
- 'port'
9
+ 'port'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -6,7 +6,7 @@ require_relative 'base'
6
6
  class SecurityGroupMissingEgressRule < BaseRule
7
7
  def rule_text
8
8
  'Missing egress rule means all traffic is allowed outbound. Make this ' \
9
- 'explicit if it is desired configuration'
9
+ 'explicit if it is desired configuration'
10
10
  end
11
11
 
12
12
  def rule_type
@@ -8,8 +8,8 @@ require 'cfn-nag/util/blank'
8
8
  class SecurityGroupRuleDescriptionRule < BaseRule
9
9
  def rule_text
10
10
  'Security group rules without a description obscure their purpose and may '\
11
- 'lead to bad practices in ensuring they only allow traffic from the ports '\
12
- 'and sources/destinations required.'
11
+ 'lead to bad practices in ensuring they only allow traffic from the ports '\
12
+ 'and sources/destinations required.'
13
13
  end
14
14
 
15
15
  def rule_type
@@ -0,0 +1,43 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'yaml'
4
+
5
+ class DenyListLoader
6
+ def initialize(rules_registry)
7
+ @rules_registry = rules_registry
8
+ end
9
+
10
+ def load(deny_list_definition:)
11
+ raise 'Empty profile' if deny_list_definition.strip == ''
12
+
13
+ deny_list_ruleset = RuleIdSet.new
14
+
15
+ deny_list_hash = load_deny_list_yaml(deny_list_definition)
16
+ raise 'Deny list is malformed' unless deny_list_hash.is_a? Hash
17
+
18
+ rules_to_suppress = deny_list_hash.fetch('RulesToSuppress', {})
19
+ raise 'Missing RulesToSuppress key in deny list' if rules_to_suppress.empty?
20
+
21
+ rule_ids_to_suppress = rules_to_suppress.map { |rule| rule['id'] }
22
+ rule_ids_to_suppress.each do |rule_id|
23
+ check_valid_rule_id rule_id
24
+ deny_list_ruleset.add_rule rule_id
25
+ end
26
+
27
+ deny_list_ruleset
28
+ end
29
+
30
+ private
31
+
32
+ def load_deny_list_yaml(deny_list_definition)
33
+ YAML.safe_load(deny_list_definition)
34
+ rescue StandardError => yaml_parse_error
35
+ raise "YAML parse of deny list failed: #{yaml_parse_error}"
36
+ end
37
+
38
+ def check_valid_rule_id(rule_id)
39
+ return true unless @rules_registry.by_id(rule_id).nil?
40
+
41
+ raise "#{rule_id} is not a legal rule identifier from: #{@rules_registry.ids}"
42
+ end
43
+ end
@@ -11,8 +11,8 @@ class SPCM
11
11
  parameter_values_path: nil,
12
12
  condition_values_path: nil,
13
13
  template_pattern: DEFAULT_TEMPLATE_PATTERN)
14
- parameter_values_string = parameter_values_path.nil? ? nil : IO.read(parameter_values_path)
15
- condition_values_string = condition_values_path.nil? ? nil : IO.read(condition_values_path)
14
+ parameter_values_string = parameter_values_path.nil? ? nil : File.read(parameter_values_path)
15
+ condition_values_string = condition_values_path.nil? ? nil : File.read(condition_values_path)
16
16
 
17
17
  templates = TemplateDiscovery.new.discover_templates(input_json_path: input_path,
18
18
  template_pattern: template_pattern)
@@ -21,7 +21,7 @@ class SPCM
21
21
  aggregate_results << {
22
22
  filename: template,
23
23
  file_results: metric(
24
- cloudformation_string: IO.read(template),
24
+ cloudformation_string: File.read(template),
25
25
  parameter_values_string: parameter_values_string,
26
26
  condition_values_string: condition_values_string
27
27
  )
@@ -29,5 +29,5 @@ end
29
29
  # is not present; otherwise returns true
30
30
  def no_echo_and_no_default_parameter_check(cfn_model, key_to_check)
31
31
  parameter = cfn_model.parameters[key_to_check['Ref']]
32
- truthy?(parameter.noEcho) && parameter.default.nil? ? false : true
32
+ !(truthy?(parameter.noEcho) && parameter.default.nil?)
33
33
  end
@@ -1,7 +1,7 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  require 'cfn-nag/profile_loader'
4
- require 'cfn-nag/blacklist_loader'
4
+ require 'cfn-nag/deny_list_loader'
5
5
 
6
6
  module ViolationFiltering
7
7
  def filter_violations_by_profile(profile_definition:, rule_definitions:, violations:)
@@ -20,19 +20,19 @@ module ViolationFiltering
20
20
  end
21
21
  end
22
22
 
23
- def filter_violations_by_blacklist(blacklist_definition:, rule_definitions:, violations:)
24
- blacklist = nil
25
- unless blacklist_definition.nil?
23
+ def filter_violations_by_deny_list(deny_list_definition:, rule_definitions:, violations:)
24
+ deny_list = nil
25
+ unless deny_list_definition.nil?
26
26
  begin
27
- blacklist = BlackListLoader.new(rule_definitions)
28
- .load(blacklist_definition: blacklist_definition)
29
- rescue StandardError => blacklist_load_error
30
- raise "Blacklist loading error: #{blacklist_load_error}"
27
+ deny_list = DenyListLoader.new(rule_definitions)
28
+ .load(deny_list_definition: deny_list_definition)
29
+ rescue StandardError => deny_list_load_error
30
+ raise "Deny list loading error: #{deny_list_load_error}"
31
31
  end
32
32
  end
33
33
 
34
34
  violations.reject do |violation|
35
- !blacklist.nil? && blacklist.contains_rule?(violation.id)
35
+ !deny_list.nil? && deny_list.contains_rule?(violation.id)
36
36
  end
37
37
  end
38
38
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: cfn-nag
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.7.14
4
+ version: 0.8.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Eric Kascic
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-06-15 00:00:00.000000000 Z
11
+ date: 2021-10-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: rake
@@ -72,14 +72,14 @@ dependencies:
72
72
  requirements:
73
73
  - - '='
74
74
  - !ruby/object:Gem::Version
75
- version: 0.6.0
75
+ version: 0.6.4
76
76
  type: :runtime
77
77
  prerelease: false
78
78
  version_requirements: !ruby/object:Gem::Requirement
79
79
  requirements:
80
80
  - - '='
81
81
  - !ruby/object:Gem::Version
82
- version: 0.6.0
82
+ version: 0.6.4
83
83
  - !ruby/object:Gem::Dependency
84
84
  name: logging
85
85
  requirement: !ruby/object:Gem::Requirement
@@ -180,7 +180,6 @@ files:
180
180
  - bin/spcm_scan
181
181
  - lib/cfn-nag.rb
182
182
  - lib/cfn-nag/base_rule.rb
183
- - lib/cfn-nag/blacklist_loader.rb
184
183
  - lib/cfn-nag/cfn_nag.rb
185
184
  - lib/cfn-nag/cfn_nag_config.rb
186
185
  - lib/cfn-nag/cfn_nag_executor.rb
@@ -359,6 +358,7 @@ files:
359
358
  - lib/cfn-nag/custom_rules/password_base_rule.rb
360
359
  - lib/cfn-nag/custom_rules/resource_base_rule.rb
361
360
  - lib/cfn-nag/custom_rules/sub_property_with_list_password_base_rule.rb
361
+ - lib/cfn-nag/deny_list_loader.rb
362
362
  - lib/cfn-nag/iam_complexity_metric/condition_metric.rb
363
363
  - lib/cfn-nag/iam_complexity_metric/html_results_renderer.rb
364
364
  - lib/cfn-nag/iam_complexity_metric/policy_document_metric.rb
@@ -1,43 +0,0 @@
1
- # frozen_string_literal: true
2
-
3
- require 'yaml'
4
-
5
- class BlackListLoader
6
- def initialize(rules_registry)
7
- @rules_registry = rules_registry
8
- end
9
-
10
- def load(blacklist_definition:)
11
- raise 'Empty profile' if blacklist_definition.strip == ''
12
-
13
- blacklist_ruleset = RuleIdSet.new
14
-
15
- blacklist_hash = load_blacklist_yaml(blacklist_definition)
16
- raise 'Blacklist is malformed' unless blacklist_hash.is_a? Hash
17
-
18
- rules_to_suppress = blacklist_hash.fetch('RulesToSuppress', {})
19
- raise 'Missing RulesToSuppress key in black list' if rules_to_suppress.empty?
20
-
21
- rule_ids_to_suppress = rules_to_suppress.map { |rule| rule['id'] }
22
- rule_ids_to_suppress.each do |rule_id|
23
- check_valid_rule_id rule_id
24
- blacklist_ruleset.add_rule rule_id
25
- end
26
-
27
- blacklist_ruleset
28
- end
29
-
30
- private
31
-
32
- def load_blacklist_yaml(blacklist_definition)
33
- YAML.safe_load(blacklist_definition)
34
- rescue StandardError => yaml_parse_error
35
- raise "YAML parse of blacklist failed: #{yaml_parse_error}"
36
- end
37
-
38
- def check_valid_rule_id(rule_id)
39
- return true unless @rules_registry.by_id(rule_id).nil?
40
-
41
- raise "#{rule_id} is not a legal rule identifier from: #{@rules_registry.ids}"
42
- end
43
- end