cfn-nag 0.4.37 → 0.4.38

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c63f7a83ba068114a9895b55e32158e25dd87f67cd1ec027487bc64102457364
4
- data.tar.gz: 661de07e06346df408a824655e8d148a161df50833244e85a0aa0d57a127d6ee
3
+ metadata.gz: 2fb1bee12e87bb5e68bdfe15ba0a3ff77525fa2b9aca01d75707a323365de8bb
4
+ data.tar.gz: b21e9a17e5131846e0440b2b254b705bfead9d360f76bbe29775391469ab211a
5
5
  SHA512:
6
- metadata.gz: e917e24120ff829d3c12291e02f6ae360cdebdc97e0aef5db42ecae9a85f74061423fe1565c22dc622baa94e7b3f1197e7fc6f4acb6b5481e4ba08c9d32fde8a
7
- data.tar.gz: bc6b05f9068133fd662416fe4f21243ba78277ec61855d1c01bb4e3a5ca0283a4f3f19c20751bdb93db6544d18add75a825f7f012f4628278e6e8e29562fc7c1
6
+ metadata.gz: 34a547ee71bd06ebdeee34e4f3a6b9155e44d6999b6ebdbbd15172ab120ae36cdfcda159a8578a4d45a690f780f8b7a56d3bb2dbd277f543cbd5273e00a1e16f
7
+ data.tar.gz: 199fce4055e59caab622deb66a5a82111e94adf4be7923255c392243ef41b13e4080e0f655b79e32f3d6e963b09fd9351c8e8720b1ae956416d65975e595bbc0
@@ -0,0 +1,37 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'cfn-nag/violation'
4
+ require_relative 'base'
5
+
6
+ class SecurityGroupEgressAllProtocolsRule < BaseRule
7
+ def rule_text
8
+ 'Security Groups egress with an IpProtocol of -1 found'
9
+ end
10
+
11
+ def rule_type
12
+ Violation::WARNING
13
+ end
14
+
15
+ def rule_id
16
+ 'W40'
17
+ end
18
+
19
+ ##
20
+ # This will behave slightly different than the legacy jq based rule which was
21
+ # targeted against inline ingress only
22
+ def audit_impl(cfn_model)
23
+ violating_security_groups = cfn_model.security_groups.select do |security_group|
24
+ violating_egresses = security_group.egresses.select do |egress|
25
+ egress.ipProtocol.to_i == -1
26
+ end
27
+
28
+ !violating_egresses.empty?
29
+ end
30
+
31
+ violating_egresses = cfn_model.standalone_egress.select do |standalone_egress|
32
+ standalone_egress.ipProtocol.to_i == -1
33
+ end
34
+
35
+ violating_security_groups.map(&:logical_resource_id) + violating_egresses.map(&:logical_resource_id)
36
+ end
37
+ end
@@ -0,0 +1,37 @@
1
+ # frozen_string_literal: true
2
+
3
+ require 'cfn-nag/violation'
4
+ require_relative 'base'
5
+
6
+ class SecurityGroupIngressAllProtocolsRule < BaseRule
7
+ def rule_text
8
+ 'Security Groups ingress with an ipProtocol of -1 found '
9
+ end
10
+
11
+ def rule_type
12
+ Violation::WARNING
13
+ end
14
+
15
+ def rule_id
16
+ 'W42'
17
+ end
18
+
19
+ ##
20
+ # This will behave slightly different than the legacy jq based rule which was
21
+ # targeted against inline ingress only
22
+ def audit_impl(cfn_model)
23
+ violating_security_groups = cfn_model.security_groups.select do |security_group|
24
+ violating_ingresses = security_group.ingresses.select do |ingress|
25
+ ingress.ipProtocol.to_i == -1
26
+ end
27
+
28
+ !violating_ingresses.empty?
29
+ end
30
+
31
+ violating_ingresses = cfn_model.standalone_ingress.select do |standalone_ingress|
32
+ standalone_ingress.ipProtocol.to_i == -1
33
+ end
34
+
35
+ violating_security_groups.map(&:logical_resource_id) + violating_ingresses.map(&:logical_resource_id)
36
+ end
37
+ end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: cfn-nag
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.37
4
+ version: 0.4.38
5
5
  platform: ruby
6
6
  authors:
7
7
  - Eric Kascic
@@ -228,8 +228,10 @@ files:
228
228
  - lib/cfn-nag/custom_rules/S3BucketPolicyWildcardPrincipalRule.rb
229
229
  - lib/cfn-nag/custom_rules/S3BucketPublicReadAclRule.rb
230
230
  - lib/cfn-nag/custom_rules/S3BucketPublicReadWriteAclRule.rb
231
+ - lib/cfn-nag/custom_rules/SecurityGroupEgressAllProtocolsRule.rb
231
232
  - lib/cfn-nag/custom_rules/SecurityGroupEgressOpenToWorldRule.rb
232
233
  - lib/cfn-nag/custom_rules/SecurityGroupEgressPortRangeRule.rb
234
+ - lib/cfn-nag/custom_rules/SecurityGroupIngressAllProtocolsRule.rb
233
235
  - lib/cfn-nag/custom_rules/SecurityGroupIngressCidrNon32Rule.rb
234
236
  - lib/cfn-nag/custom_rules/SecurityGroupIngressOpenToWorldRule.rb
235
237
  - lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb