Skip to content

Commit

Permalink
Merge branch 'bump-trivy-2' into test-examples
Browse files Browse the repository at this point in the history
  • Loading branch information
nikpivkin committed Sep 23, 2024
2 parents 2e77904 + 8b5a6a1 commit 5631ba6
Show file tree
Hide file tree
Showing 104 changed files with 174 additions and 178 deletions.
2 changes: 1 addition & 1 deletion checks/cloud/aws/apigateway/enable_access_logging.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/apigatewayv2_stage#access_log_settings
# good_examples: checks/cloud/aws/apigateway/enable_access_logging.tf.go
# bad_examples: checks/cloud/aws/apigateway/enable_access_logging.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/apigateway/enable_access_logging.cf.go
# bad_examples: checks/cloud/aws/apigateway/enable_access_logging.cf.go
package builtin.aws.apigateway.aws0001
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/athena/enable_at_rest_encryption.rego
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/athena_database#encryption_configuration
# good_examples: checks/cloud/aws/athena/enable_at_rest_encryption.tf.go
# bad_examples: checks/cloud/aws/athena/enable_at_rest_encryption.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/athena/enable_at_rest_encryption.cf.go
# bad_examples: checks/cloud/aws/athena/enable_at_rest_encryption.cf.go
package builtin.aws.athena.aws0006
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/athena/no_encryption_override.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/athena_workgroup#configuration
# good_examples: checks/cloud/aws/athena/no_encryption_override.tf.go
# bad_examples: checks/cloud/aws/athena/no_encryption_override.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/athena/no_encryption_override.cf.go
# bad_examples: checks/cloud/aws/athena/no_encryption_override.cf.go
package builtin.aws.athena.aws0007
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/cloudfront/enable_logging.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution#logging_config
# good_examples: checks/cloud/aws/cloudfront/enable_logging.tf.go
# bad_examples: checks/cloud/aws/cloudfront/enable_logging.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudfront/enable_logging.cf.go
# bad_examples: checks/cloud/aws/cloudfront/enable_logging.cf.go
package builtin.aws.cloudfront.aws0010
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/cloudfront/enable_waf.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution#web_acl_id
# good_examples: checks/cloud/aws/cloudfront/enable_waf.tf.go
# bad_examples: checks/cloud/aws/cloudfront/enable_waf.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudfront/enable_waf.cf.go
# bad_examples: checks/cloud/aws/cloudfront/enable_waf.cf.go
package builtin.aws.cloudfront.aws0011
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/cloudfront/enforce_https.rego
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution#viewer_protocol_policy
# good_examples: checks/cloud/aws/cloudfront/enforce_https.tf.go
# bad_examples: checks/cloud/aws/cloudfront/enforce_https.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudfront/enforce_https.cf.go
# bad_examples: checks/cloud/aws/cloudfront/enforce_https.cf.go
package builtin.aws.cloudfront.aws0012
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/cloudfront/use_secure_tls_policy.rego
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution#minimum_protocol_version
# good_examples: checks/cloud/aws/cloudfront/use_secure_tls_policy.tf.go
# bad_examples: checks/cloud/aws/cloudfront/use_secure_tls_policy.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudfront/use_secure_tls_policy.cf.go
# bad_examples: checks/cloud/aws/cloudfront/use_secure_tls_policy.cf.go
package builtin.aws.cloudfront.aws0013
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/cloudtrail/enable_all_regions.rego
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#is_multi_region_trail
# good_examples: checks/cloud/aws/cloudtrail/enable_all_regions.tf.go
# bad_examples: checks/cloud/aws/cloudtrail/enable_all_regions.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudtrail/enable_all_regions.cf.go
# bad_examples: checks/cloud/aws/cloudtrail/enable_all_regions.cf.go
package builtin.aws.cloudtrail.aws0014
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/cloudtrail/enable_log_validation.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#enable_log_file_validation
# good_examples: checks/cloud/aws/cloudtrail/enable_log_validation.tf.go
# bad_examples: checks/cloud/aws/cloudtrail/enable_log_validation.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudtrail/enable_log_validation.cf.go
# bad_examples: checks/cloud/aws/cloudtrail/enable_log_validation.cf.go
package builtin.aws.cloudtrail.aws0016
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/cloudtrail/encryption_customer_key.rego
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#kms_key_id
# good_examples: checks/cloud/aws/cloudtrail/encryption_customer_key.tf.go
# bad_examples: checks/cloud/aws/cloudtrail/encryption_customer_key.tf.go
# cloudformation:
# cloud_formation:
# links:
# - https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudtrail-trail.html#cfn-cloudtrail-trail-kmskeyid
# good_examples: checks/cloud/aws/cloudtrail/encryption_customer_key.cf.go
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail
# good_examples: checks/cloud/aws/cloudtrail/ensure_cloudwatch_integration.tf.go
# bad_examples: checks/cloud/aws/cloudtrail/ensure_cloudwatch_integration.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudtrail/ensure_cloudwatch_integration.cf.go
# bad_examples: checks/cloud/aws/cloudtrail/ensure_cloudwatch_integration.cf.go
package builtin.aws.cloudtrail.aws0162
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/cloudtrail/no_public_log_access.rego
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#is_multi_region_trail
# good_examples: checks/cloud/aws/cloudtrail/no_public_log_access.tf.go
# bad_examples: checks/cloud/aws/cloudtrail/no_public_log_access.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudtrail/no_public_log_access.cf.go
# bad_examples: checks/cloud/aws/cloudtrail/no_public_log_access.cf.go
package builtin.aws.cloudtrail.aws0161
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#is_multi_region_trail
# good_examples: checks/cloud/aws/cloudtrail/require_bucket_access_logging.tf.go
# bad_examples: checks/cloud/aws/cloudtrail/require_bucket_access_logging.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudtrail/require_bucket_access_logging.cf.go
# bad_examples: checks/cloud/aws/cloudtrail/require_bucket_access_logging.cf.go
package builtin.aws.cloudtrail.aws0163
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/cloudwatch/log_group_customer_key.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group#kms_key_id
# good_examples: checks/cloud/aws/cloudwatch/log_group_customer_key.tf.go
# bad_examples: checks/cloud/aws/cloudwatch/log_group_customer_key.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/cloudwatch/log_group_customer_key.cf.go
# bad_examples: checks/cloud/aws/cloudwatch/log_group_customer_key.cf.go
package builtin.aws.cloudwatch.aws0017
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/codebuild/enable_encryption.rego
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/codebuild_project#encryption_disabled
# good_examples: checks/cloud/aws/codebuild/enable_encryption.tf.go
# bad_examples: checks/cloud/aws/codebuild/enable_encryption.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/codebuild/enable_encryption.cf.go
# bad_examples: checks/cloud/aws/codebuild/enable_encryption.cf.go
package builtin.aws.codebuild.aws0018
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/config/aggregate_all_regions.rego
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/config_configuration_aggregator#all_regions
# good_examples: checks/cloud/aws/config/aggregate_all_regions.tf.go
# bad_examples: checks/cloud/aws/config/aggregate_all_regions.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/config/aggregate_all_regions.cf.go
# bad_examples: checks/cloud/aws/config/aggregate_all_regions.cf.go
package builtin.aws.config.aws0019
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/documentdb/enable_log_export.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/docdb_cluster#enabled_cloudwatch_logs_exports
# good_examples: checks/cloud/aws/documentdb/enable_log_export.tf.go
# bad_examples: checks/cloud/aws/documentdb/enable_log_export.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/documentdb/enable_log_export.cf.go
# bad_examples: checks/cloud/aws/documentdb/enable_log_export.cf.go
package builtin.aws.documentdb.aws0020
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/documentdb/enable_storage_encryption.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/docdb_cluster#storage_encrypted
# good_examples: checks/cloud/aws/documentdb/enable_storage_encryption.tf.go
# bad_examples: checks/cloud/aws/documentdb/enable_storage_encryption.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/documentdb/enable_storage_encryption.cf.go
# bad_examples: checks/cloud/aws/documentdb/enable_storage_encryption.cf.go
package builtin.aws.documentdb.aws0021
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/documentdb/encryption_customer_key.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/docdb_cluster#kms_key_id
# good_examples: checks/cloud/aws/documentdb/encryption_customer_key.tf.go
# bad_examples: checks/cloud/aws/documentdb/encryption_customer_key.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/documentdb/encryption_customer_key.cf.go
# bad_examples: checks/cloud/aws/documentdb/encryption_customer_key.cf.go
package builtin.aws.documentdb.aws0022
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/dynamodb/enable_at_rest_encryption.rego
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/dax_cluster#server_side_encryption
# good_examples: checks/cloud/aws/dynamodb/enable_at_rest_encryption.tf.go
# bad_examples: checks/cloud/aws/dynamodb/enable_at_rest_encryption.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/dynamodb/enable_at_rest_encryption.cf.go
# bad_examples: checks/cloud/aws/dynamodb/enable_at_rest_encryption.cf.go
package builtin.aws.dynamodb.aws0023
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule
# good_examples: checks/cloud/aws/ec2/add_description_to_security_group.tf.go
# bad_examples: checks/cloud/aws/ec2/add_description_to_security_group.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/add_description_to_security_group.cf.go
# bad_examples: checks/cloud/aws/ec2/add_description_to_security_group.cf.go
package builtin.aws.ec2.aws0099
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule
# good_examples: checks/cloud/aws/ec2/add_description_to_security_group_rule.tf.go
# bad_examples: checks/cloud/aws/ec2/add_description_to_security_group_rule.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/add_description_to_security_group_rule.cf.go
# bad_examples: checks/cloud/aws/ec2/add_description_to_security_group_rule.cf.go
package builtin.aws.ec2.aws0124
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/as_enable_at_rest_encryption.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#ebs-ephemeral-and-root-block-devices
# good_examples: checks/cloud/aws/ec2/as_enable_at_rest_encryption.tf.go
# bad_examples: checks/cloud/aws/ec2/as_enable_at_rest_encryption.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/as_enable_at_rest_encryption.cf.go
# bad_examples: checks/cloud/aws/ec2/as_enable_at_rest_encryption.cf.go
package builtin.aws.ec2.aws0008
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/as_enforce_http_token_imds.rego
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#metadata-options
# good_examples: checks/cloud/aws/ec2/as_enforce_http_token_imds.tf.go
# bad_examples: checks/cloud/aws/ec2/as_enforce_http_token_imds.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/as_enforce_http_token_imds.cf.go
# bad_examples: checks/cloud/aws/ec2/as_enforce_http_token_imds.cf.go
package builtin.aws.ec2.aws0130
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/as_no_secrets_in_user_data.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#user_data
# good_examples: checks/cloud/aws/ec2/as_no_secrets_in_user_data.tf.go
# bad_examples: checks/cloud/aws/ec2/as_no_secrets_in_user_data.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/as_no_secrets_in_user_data.cf.go
# bad_examples: checks/cloud/aws/ec2/as_no_secrets_in_user_data.cf.go
package builtin.aws.ec2.aws0129
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/enable_at_rest_encryption.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#ebs-ephemeral-and-root-block-devices
# good_examples: checks/cloud/aws/ec2/enable_at_rest_encryption.tf.go
# bad_examples: checks/cloud/aws/ec2/enable_at_rest_encryption.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/enable_at_rest_encryption.cf.go
# bad_examples: checks/cloud/aws/ec2/enable_at_rest_encryption.cf.go
package builtin.aws.ec2.aws0131
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/enable_volume_encryption.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ebs_volume#encrypted
# good_examples: checks/cloud/aws/ec2/enable_volume_encryption.tf.go
# bad_examples: checks/cloud/aws/ec2/enable_volume_encryption.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/enable_volume_encryption.cf.go
# bad_examples: checks/cloud/aws/ec2/enable_volume_encryption.cf.go
package builtin.aws.ec2.aws0026
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/encryption_customer_key.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ebs_volume#kms_key_id
# good_examples: checks/cloud/aws/ec2/encryption_customer_key.tf.go
# bad_examples: checks/cloud/aws/ec2/encryption_customer_key.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/encryption_customer_key.cf.go
# bad_examples: checks/cloud/aws/ec2/encryption_customer_key.cf.go
package builtin.aws.ec2.aws0027
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/no_excessive_port_access.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/network_acl_rule#to_port
# good_examples: checks/cloud/aws/ec2/no_excessive_port_access.tf.go
# bad_examples: checks/cloud/aws/ec2/no_excessive_port_access.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/no_excessive_port_access.cf.go
# bad_examples: checks/cloud/aws/ec2/no_excessive_port_access.cf.go
package builtin.aws.ec2.aws0102
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/no_public_egress_sgr.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group
# good_examples: checks/cloud/aws/ec2/no_public_egress_sgr.tf.go
# bad_examples: checks/cloud/aws/ec2/no_public_egress_sgr.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/no_public_egress_sgr.cf.go
# bad_examples: checks/cloud/aws/ec2/no_public_egress_sgr.cf.go
package builtin.aws.ec2.aws0104
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/no_public_ingress_acl.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/network_acl_rule#cidr_block
# good_examples: checks/cloud/aws/ec2/no_public_ingress_acl.tf.go
# bad_examples: checks/cloud/aws/ec2/no_public_ingress_acl.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/no_public_ingress_acl.cf.go
# bad_examples: checks/cloud/aws/ec2/no_public_ingress_acl.cf.go
package builtin.aws.ec2.aws0105
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/no_public_ingress_sgr.rego
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule#cidr_blocks
# good_examples: checks/cloud/aws/ec2/no_public_ingress_sgr.tf.go
# bad_examples: checks/cloud/aws/ec2/no_public_ingress_sgr.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/no_public_ingress_sgr.cf.go
# bad_examples: checks/cloud/aws/ec2/no_public_ingress_sgr.cf.go
package builtin.aws.ec2.aws0107
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/no_public_ip.rego
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#associate_public_ip_address
# good_examples: checks/cloud/aws/ec2/no_public_ip.tf.go
# bad_examples: checks/cloud/aws/ec2/no_public_ip.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/no_public_ip.cf.go
# bad_examples: checks/cloud/aws/ec2/no_public_ip.cf.go
package builtin.aws.ec2.aws0009
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/no_public_ip_subnet.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/subnet#map_public_ip_on_launch
# good_examples: checks/cloud/aws/ec2/no_public_ip_subnet.tf.go
# bad_examples: checks/cloud/aws/ec2/no_public_ip_subnet.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/no_public_ip_subnet.cf.go
# bad_examples: checks/cloud/aws/ec2/no_public_ip_subnet.cf.go
package builtin.aws.ec2.aws0164
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ec2/no_secrets_in_user_data.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#user_data
# good_examples: checks/cloud/aws/ec2/no_secrets_in_user_data.tf.go
# bad_examples: checks/cloud/aws/ec2/no_secrets_in_user_data.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ec2/no_secrets_in_user_data.cf.go
# bad_examples: checks/cloud/aws/ec2/no_secrets_in_user_data.cf.go
package builtin.aws.ec2.aws0029
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ecr/enable_image_scans.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository#image_scanning_configuration
# good_examples: checks/cloud/aws/ecr/enable_image_scans.tf.go
# bad_examples: checks/cloud/aws/ecr/enable_image_scans.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ecr/enable_image_scans.cf.go
# bad_examples: checks/cloud/aws/ecr/enable_image_scans.cf.go
package builtin.aws.ecr.aws0030
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ecr/enforce_immutable_repository.rego
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository
# good_examples: checks/cloud/aws/ecr/enforce_immutable_repository.tf.go
# bad_examples: checks/cloud/aws/ecr/enforce_immutable_repository.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ecr/enforce_immutable_repository.cf.go
# bad_examples: checks/cloud/aws/ecr/enforce_immutable_repository.cf.go
package builtin.aws.ecr.aws0031
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ecr/no_public_access.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository_policy#policy
# good_examples: checks/cloud/aws/ecr/no_public_access.tf.go
# bad_examples: checks/cloud/aws/ecr/no_public_access.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ecr/no_public_access.cf.go
# bad_examples: checks/cloud/aws/ecr/no_public_access.cf.go
package builtin.aws.ecr.aws0032
Expand Down
2 changes: 1 addition & 1 deletion checks/cloud/aws/ecr/repository_customer_key.rego
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@
# - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository#encryption_configuration
# good_examples: checks/cloud/aws/ecr/repository_customer_key.tf.go
# bad_examples: checks/cloud/aws/ecr/repository_customer_key.tf.go
# cloudformation:
# cloud_formation:
# good_examples: checks/cloud/aws/ecr/repository_customer_key.cf.go
# bad_examples: checks/cloud/aws/ecr/repository_customer_key.cf.go
package builtin.aws.ecr.aws0033
Expand Down
Loading

0 comments on commit 5631ba6

Please sign in to comment.