diff --git a/.github/workflows/test_action.yaml b/.github/workflows/test_action.yaml index b037c5b..e94020c 100644 --- a/.github/workflows/test_action.yaml +++ b/.github/workflows/test_action.yaml @@ -1,6 +1,7 @@ name: Test KICS action on: + workflow_dispatch: pull_request: types: [opened] @@ -12,4 +13,8 @@ jobs: - name: Test KICS action uses: ./ with: - path: positive.tf + path: test/samples/positive1.tf,test/samples/positive2.tf + token: ${{ secrets.GITHUB_TOKEN }} + timeout: 60 + verbose: true + enable_comments: true diff --git a/action.yml b/action.yml index 7552adc..e406694 100644 --- a/action.yml +++ b/action.yml @@ -47,7 +47,7 @@ inputs: description: "formats in which the results report will be exported (json, sarif)" required: false output_path: - description: "file path to store results report (json, sarif)" + description: "directory to store results report" required: false payload_path: description: "file path to store source internal representation in JSON format" diff --git a/deps.txt b/deps.txt deleted file mode 100644 index 008478c..0000000 --- a/deps.txt +++ /dev/null @@ -1,3 +0,0 @@ - "@fohlen/github-release-downloader": "^1.0.0", - "decompress": "^4.2.1", - "decompress-targz": "^4.1.1", \ No newline at end of file diff --git a/dist/index.js b/dist/index.js index 31e1a24..fbfcb7f 100644 --- a/dist/index.js +++ b/dist/index.js @@ -17804,7 +17804,6 @@ function wrappy (fn, cb) { /***/ 3571: /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { -const fs = __nccwpck_require__(5747); const moment = __nccwpck_require__(9623) const kicsLogo = "https://user-images.githubusercontent.com/75368139/136991766-a4e5bc8b-63db-48f7-9384-740e9f15c9f6.png" @@ -17817,13 +17816,6 @@ const severityIcons = { "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" } - -function readJSON(filename) { - const rawdata = fs.readFileSync(filename); - const parsedJSON = JSON.parse(rawdata.toString()); - return parsedJSON; -} - function createComment(results) { let message = "![kics-logo](" + kicsLogo + ")\n"; @@ -17855,12 +17847,8 @@ function createComment(results) { return message; } -async function postPRComment(repo, prNumber) { - const githubToken = core.getInput("token"); - const octokit = github.getOctokit(githubToken); - const results = readJSON("results.json"); +async function postPRComment(results, repo, prNumber, octokit) { const message = createComment(results); - console.log(message); const { data: comments } = await octokit.rest.issues.listComments({ ...repo, @@ -17893,6 +17881,7 @@ module.exports = { postPRComment }; + /***/ }), /***/ 1430: @@ -17992,19 +17981,20 @@ module.exports = { installKICS } + /***/ }), /***/ 3157: /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { const exec = __nccwpck_require__(1514); - const core = __nccwpck_require__(2186); +const filepath = __nccwpck_require__(5622); const kicsBinary = 'kics'; const kicsInput = { - path: { value_type: "string", flag: '--path', value: core.getInput('path') }, + path: { value_type: "list", flag: '--path', value: core.getInput('path') }, ignore_on_exit: { value_type: "list", flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, fail_on: { value_type: "list", flag: '--fail-on', value: core.getInput('fail_on') }, timeout: { value_type: "int", flag: '--timeout', value: core.getInput('timeout') }, @@ -18028,9 +18018,11 @@ const kicsInput = { }; async function scanWithKICS(enableComments) { + let resultsFile; + if (!kicsInput.path.value) { core.error('Path to scan is not set'); - throw new Error('Path to scan is not set'); + core.setFailed('Path to scan is not set'); } let cmdArgs = []; for (let input in kicsInput) { @@ -18041,29 +18033,56 @@ async function scanWithKICS(enableComments) { } } else if (kicsInput[input].value_type === 'list') { if (kicsInput[input].value) { - cmdArgs.push(kicsInput[input].flag); - cmdArgs.push(kicsInput[input].value); + if (kicsInput[input].value.indexOf(',') > -1) { + kicsInput[input].value.split(',').forEach(value => { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(value); + }); + } else { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } } } else if (kicsInput[input].value_type === 'bool') { if (kicsInput[input].value) { cmdArgs.push(kicsInput[input].flag); } + } else if (kicsInput[input].value_type === 'int') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } } } + + // making sure results.json is always created when PR comments are enabled if (enableComments) { if (!cmdArgs.find(arg => arg == '--output-path')) { cmdArgs.push('--output-path'); cmdArgs.push('./'); + resultsFile = './results.json'; + } else { + const outputFormats = core.getInput('output_formats'); + if (!outputFormats.toLowerCase().indexOf('json')) { + cmdArgs.push('--output-formats'); + cmdArgs.push('json'); + } + let resultsDir = core.getInput('output_path'); + resultsFile = filepath.join(resultsDir, '/results.json'); } } - - return await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`) + exitCode = await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`, [], { ignoreReturnCode: true }); + return { + statusCode: exitCode, + resultsFile: resultsFile + }; } module.exports = { scanWithKICS }; + /***/ }), /***/ 2877: @@ -18282,27 +18301,96 @@ var __webpack_exports__ = {}; const install = __nccwpck_require__(1430); const commenter = __nccwpck_require__(3571); const scanner = __nccwpck_require__(3157); + const core = __nccwpck_require__(2186); const github = __nccwpck_require__(5438); +const fs = __nccwpck_require__(5747); + const actionInputs = { kics_version: { value: core.getInput('kics_version') }, enable_comments: { value: core.getInput('enable_comments') }, } +const exitStatus = { + results: { + codes: { + HIGH: 50, + MEDIUM: 40, + LOW: 30, + INFO: 20, + }, + isResultExitStatus: function (exitCode) { + for (const key in this.codes) { + if (this.codes[key] === exitCode) { + return true; + } + } + return false; + } + } +} + +function setWorkflowStatus(statusCode) { + console.log(`KICS scan status code: ${statusCode}`); + + const ignoreOnExit = core.getInput('ignore_on_exit'); + + if (ignoreOnExit.toLowerCase() === 'all') { + console.log(`ignore_on_exit=all :: Ignoring exit code ${statusCode}`); + return; + } + + if (ignoreOnExit.toLowerCase() === 'results') { + if (exitStatus.results.isResultExitStatus(statusCode)) { + console.log(`ignore_on_exit=results :: Ignoring exit code ${statusCode}`); + return; + } + } + if (ignoreOnExit.toLowerCase() === 'errors') { + if (!exitStatus.results.isResultExitStatus(statusCode)) { + console.log(`ignore_on_exit=errors :: Ignoring exit code ${statusCode}`); + return; + } + } + + core.setFailed(`KICS scan failed with exit code ${statusCode}`); +} + +function readJSON(filename) { + const rawdata = fs.readFileSync(filename); + const parsedJSON = JSON.parse(rawdata.toString()); + return parsedJSON; +} + async function main() { console.log("Running KICS action..."); try { + const githubToken = core.getInput("token"); + const octokit = github.getOctokit(githubToken); let enableComments = actionInputs.enable_comments.value.toLocaleLowerCase() === "true"; - const context = github.context; - const repository = context.repo; - console.log(context); - const pullRequestNumber = context.payload.pull_request.number; - await install.installKICS(); - await scanner.scanWithKICS(enableComments); - if (enableComments) { - await commenter.commentOnPullRequest(repository, pullRequestNumber); + let context = {}; + let repo = ''; + let prNumber = ''; + + if (github.context) { + context = github.context; + if (context.repo) { + repo = context.repo; + } + if (context.payload && context.payload.pull_request) { + prNumber = context.payload.pull_request.number; + } } + + await install.installKICS(); + const scanResults = await scanner.scanWithKICS(enableComments); + if (enableComments) { + let parsedResults = readJSON(scanResults.resultsFile); + await commenter.postPRComment(parsedResults, repo, prNumber, octokit); + } + + setWorkflowStatus(scanResults.statusCode); } catch (e) { console.error(e); core.setFailed(e.message); @@ -18310,6 +18398,7 @@ async function main() { } main(); + })(); module.exports = __webpack_exports__; diff --git a/entrypoint.sh b/entrypoint.sh deleted file mode 100644 index 82c4d24..0000000 --- a/entrypoint.sh +++ /dev/null @@ -1,38 +0,0 @@ -#!/bin/bash -DATETIME=$(date '+%H:%M') - -if [ -z "$INPUT_PATH" ] -then - echo "${DATETIME} - ERR input path can't be empty" - exit 1 -else - INPUT_PARAM="-p $INPUT_PATH" -fi - -[[ -n "$INPUT_OUTPUT_PATH" ]] && OUTPUT_PATH_PARAM="-o $INPUT_OUTPUT_PATH" -[[ -n "$INPUT_PAYLOAD_PATH" ]] && PAYLOAD_PATH_PARAM="-d $INPUT_PAYLOAD_PATH" -[[ -n "$INPUT_CONFIG_PATH" ]] && CONFIG_PATH_PARAM="--config $INPUT_CONFIG_PATH" -[[ -n "$INPUT_EXCLUDE_PATHS" ]] && EXCLUDE_PATHS_PARAM="-e $INPUT_EXCLUDE_PATHS" -[[ -n "$INPUT_EXCLUDE_RESULTS" ]] && EXCLUDE_RESULTS_PARAM="-x $INPUT_EXCLUDE_RESULTS" -[[ -n "$INPUT_EXCLUDE_QUERIES" ]] && EXCLUDE_QUERIES_PARAM="--exclude-queries $INPUT_EXCLUDE_QUERIES" -[[ -n "$INPUT_EXCLUDE_CATEGORIES" ]] && EXCLUDE_CATEGORIES_PARAM="--exclude-categories $INPUT_EXCLUDE_CATEGORIES" -[[ -n "$INPUT_OUTPUT_FORMATS" ]] && OUTPUT_FORMATS_PARAM="--report-formats $INPUT_OUTPUT_FORMATS" -[[ -n "$INPUT_PLATFORM_TYPE" ]] && PLATFORM_TYPE_PARAM="--type $INPUT_PLATFORM_TYPE" -[[ -n "$INPUT_IGNORE_ON_EXIT" ]] && IGNORE_ON_EXIT_PARAM="--ignore-on-exit $INPUT_IGNORE_ON_EXIT" -[[ -n "$INPUT_FAIL_ON" ]] && FAIL_ON_PARAM="--fail-on $INPUT_FAIL_ON" -[[ -n "$INPUT_TIMEOUT" ]] && TIMEOUT_PARAM="--timeout $INPUT_TIMEOUT" -[[ -n "$INPUT_PROFILING" ]] && PROFILING_PARAM="--profiling $INPUT_PROFILING" - -[[ -n "$INPUT_VERBOSE" ]] && VERBOSE_PARAM="-v" - -if [ -n "$INPUT_QUERIES" ] -then - QUERIES_PARAM="-q $INPUT_QUERIES" -else - QUERIES_PARAM="-q /app/bin/assets/queries" -fi - -cd "$GITHUB_WORKSPACE" || exit 1 -echo "${DATETIME} - INF : about to scan directory $INPUT_PATH" -echo "${DATETIME} - INF : kics command kics $INPUT_PARAM $OUTPUT_PATH_PARAM $OUTPUT_FORMATS_PARAM $PLATFORM_TYPE_PARAM $PAYLOAD_PATH_PARAM $CONFIG_PATH_PARAM $EXCLUDE_PATHS_PARAM $EXCLUDE_CATEGORIES_PARAM $EXCLUDE_RESULTS_PARAM $EXCLUDE_QUERIES_PARAM $QUERIES_PARAM $VERBOSE_PARAM $IGNORE_ON_EXIT_PARAM $FAIL_ON_PARAM $TIMEOUT_PARAM $PROFILING_PARAM" -/app/bin/kics scan --no-progress "$INPUT_PARAM" "$OUTPUT_PATH_PARAM" "$OUTPUT_FORMATS_PARAM" "$PLATFORM_TYPE_PARAM" "$PAYLOAD_PATH_PARAM" "$CONFIG_PATH_PARAM" "$EXCLUDE_PATHS_PARAM" "$EXCLUDE_CATEGORIES_PARAM" "$EXCLUDE_RESULTS_PARAM" "$EXCLUDE_QUERIES_PARAM" "$QUERIES_PARAM" "$VERBOSE_PARAM" "$IGNORE_ON_EXIT_PARAM" "$FAIL_ON_PARAM" "$TIMEOUT_PARAM" "$PROFILING_PARAM" \ No newline at end of file diff --git a/package-lock.json b/package-lock.json index 4aa2710..cabb309 100644 --- a/package-lock.json +++ b/package-lock.json @@ -539,4 +539,4 @@ "integrity": "sha1-tSQ9jz7BqjXxNkYFvA0QNuMKtp8=" } } -} +} \ No newline at end of file diff --git a/results.json b/results.json deleted file mode 100644 index 5375d64..0000000 --- a/results.json +++ /dev/null @@ -1,27008 +0,0 @@ -{ - "kics_version": "development", - "files_scanned": 843, - "files_parsed": 843, - "files_failed_to_scan": 0, - "queries_total": 91, - "queries_failed_to_execute": 0, - "queries_failed_to_compute_similarity_id": 0, - "scan_id": "console", - "severity_counters": { - "HIGH": 0, - "INFO": 1628, - "LOW": 708, - "MEDIUM": 0, - "TRACE": 62 - }, - "total_counter": 2336, - "total_bom_resources": 62, - "start": "2021-10-12T12:59:43.666198+01:00", - "end": "2021-10-12T12:59:49.056688+01:00", - "paths": [ - "assets/queries/terraform/aws" - ], - "queries": [ - { - "query_name": "ALB Deletion Protection Disabled", - "query_id": "afecd1f1-6378-4f7e-bb3b-60c35801fdd4", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb#enable_deletion_protection", - "severity": "LOW", - "platform": "Terraform", - "category": "Insecure Configurations", - "description": "Application Load Balancer should have deletion protection enabled", - "description_id": "224b3c6f", - "files": [ - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative1.tf", - "similarity_id": "6e41b4c14440fc42d084ec54de37649d7dff0731870ba949cd6e5a7308df0173", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[enabled]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf", - "similarity_id": "0586b1fcf7fc544b156c7f766990df91d44b25e59e367f9847e0be38efae6ef9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf", - "similarity_id": "00c7a5de0048d51284592f915eedcc9b4f3f0acde8c657d8622c9bc97a76ed12", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[disabled_2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/negative.tf", - "similarity_id": "347945dbe47e4dd647bf7069eaef81d45d804976b3663d456e4e876bba2b68d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[foo33]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", - "similarity_id": "8e2c4790ddcf078f5ee3ccda51f61eccef8540d1c248ab17c3fb5aafe0f80434", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[disabled_1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf", - "similarity_id": "1020cc6e107aa3e0f06c7a62da1120481a3ab91e74de9370dc72ce9d5c6a5167", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf", - "similarity_id": "9b8627cd2f542bfc8cd4c46ce61f9f8a3566cff28b186244cfc929ec8d9bbffa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf", - "similarity_id": "79107a63984e85c1e602bf9b2bad95fe737e1f1b3e79d473213ef281f81f03f8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "37bc9fa516485cccd6089a02271256d8afcf2afcf3f8e17ea383631c7556c6f1", - "line": 28, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf", - "similarity_id": "79fe377af1d9a8099b871e93b737e0e49eddaff8f565431ce509e19d4b87d304", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_lb[positive3].enable_deletion_protection", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is set to true", - "actual_value": "'enable_deletion_protection' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf", - "similarity_id": "b5df7b7fa7f7822a7387fb9ee48544ffbe128e24c9871fc0a4a999477746d2cc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[disabled_1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf", - "similarity_id": "f9548e390f291fa2aaf8fe8b9cb58e63ba54a949004008f87c5ee75eb8cb864d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "e1a97baefce0eeb08fbb74630e5bed8f7773d733b83ced9d19b30a38436589e5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", - "similarity_id": "ab2dbfcc0ec7097f3905f2971a280f85d22a09ac3fdf534a29069bf7e6f41ad9", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[disabled_2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", - "similarity_id": "36f76cafe1b909883c7de8d12e50bc280c2b59e189891ec73d382000b8ae06ad", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[disabled_1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf", - "similarity_id": "5605a2534f408e017b591a2b5ca499cd089001f0f1d71dae13e970d309145cb9", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_alb[positive1].enable_deletion_protection", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is set to true", - "actual_value": "'enable_deletion_protection' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf", - "similarity_id": "f41a22332bc00c57fe53adeabed25c7f99b93d89251a1d6ce36a17f22677b273", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test33]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", - "similarity_id": "2e6c1ce04a1d0b42ebdc5020a6ce9b0ac90f37b5b6d72535e22c643cc97a5ec4", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[enabled]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf", - "similarity_id": "a749007a35221207e5f9c8e8a8166a636abf5e54f9370883f41044fa2cdd965d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf", - "similarity_id": "e9445c6f8155c2dacf56f8747bd8feb08cf1addeb801a25e238412ba29e24840", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf", - "similarity_id": "20ac402e382fa0888bae94571a65b0f05c9c721ed031b51eaa8f71c710063215", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test3]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/positive.tf", - "similarity_id": "e28effb6d1c26cd009d583dcb96405be6e9bc2f42aac2bb100d2997314f1b456", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "7b1810d5e9ed391821c0fa2bc5aab8bdaa40ffc9ed1bd362ecd15da6c5446fcb", - "line": 49, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf", - "similarity_id": "637ffc6e1680617cc97ac2479450372317f6df5d5acb2df28ef4cab678f4c1ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf", - "similarity_id": "df08dd37db81ade124c03a36e2b9d4e4eb54a748ad6e68b33b3dbf205df4b7b1", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module[alb].enable_deletion_protection", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is set to true", - "actual_value": "'enable_deletion_protection' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "1830dce5112123f8856e94cf507209143e25443676ec469084ddc37a8f2bce24", - "line": 49, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", - "similarity_id": "6d3061d0d0de149f7e52bcc08629463415e3c0a86989ffe81369400188cf3372", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[disabled_2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", - "similarity_id": "c79eae1b40a57e59fa0e322b919ccc70ea09bcc4422e32c29735aa095b6b6b19", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[enabled]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf", - "similarity_id": "eafafcd9b805eb6442ceb40c1ae54e1e68223a9bc22d397b38a13e540bf46143", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[enabled]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - } - ] - }, - { - "query_name": "API Gateway Deployment Without API Gateway UsagePlan Associated", - "query_id": "b3a59b8e-94a3-403e-b6e2-527abaf12034", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_deployment", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "API Gateway Deployment should have API Gateway UsagePlan defined and associated.", - "description_id": "a5480b6e", - "files": [ - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", - "similarity_id": "315245822a4dc6f97239990f1a8fadee201edb066587086ba3d0ae1aa5e73b49", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[example3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[example3] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[example3] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "e7cad90a71cb564c2a229023b511c18cb3a94117fdc350d3e8d90d129cd340a8", - "line": 38, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[api_gw_deploy]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[api_gw_deploy] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[api_gw_deploy] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "014887ac8a52789a764bbec5ff9c952c0c99622958512a84d85c2090a7c23e99", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "121e5015a86c3ebf9c6c8b0ce0ec2686edcbbf7b1ccfb6bbd7788ebbc0d433ef", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", - "similarity_id": "0557c925f271b9ecb14693a38bd826d755479fcd9a54f20aaa04070c38b619aa", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[example5]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[example5] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[example5] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", - "similarity_id": "fe046182e3c25d5bb59028a62d80d7bfa82f1f2f01334802556b4d4c48ef6405", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[examplee]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[examplee] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[examplee] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", - "similarity_id": "801181d9fc5f41b964e09afb3af9f3f516cb0ffc5bd734ea02ef41bd3b58355c", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[example4]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[example4] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[example4] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - } - ] - }, - { - "query_name": "API Gateway Stage Without API Gateway UsagePlan Associated", - "query_id": "c999cf62-0920-40f8-8dda-0caccd66ed7e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_stage", - "severity": "LOW", - "platform": "Terraform", - "category": "Resource Management", - "description": "API Gateway Stage should have API Gateway UsagePlan defined and associated.", - "description_id": "72d08d94", - "files": [ - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", - "similarity_id": "ba8fafdf15c4fbfc8194b4c709d01e767f5ec665ec35df243593b62b45007231", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf", - "similarity_id": "7290a4d8d2c7bed78dbea097027a0465cdb6f78bfeacc102bd2d10922ac8bbd1", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", - "similarity_id": "30911dee2e97d890162bae4f3896b7eb7f7833a3b4fb9102f76ef6dcee10d743", - "line": 11, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example0]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example0] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example0] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", - "similarity_id": "d025d9988281a2f1f4e12c09e918f8c6f2197cfd3f4303c5f37b9f9fd8d4af7c", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "a17fa417702ebb855c29eac44ecf5dfe9f0a58878bf82f8402dbff64c721aca8", - "line": 72, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[api_gw_stage]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[api_gw_stage] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[api_gw_stage] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", - "similarity_id": "ede6130eace2da0b1b478ba65c005386911acef1ef358a846e5b22b3d67a7b19", - "line": 25, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf", - "similarity_id": "e5fcbba9c9307caa16b33c2e174aff2163e6bfb4d9697eb0301d2c7816617324", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", - "similarity_id": "9dcefcee24bda40bd556195645dd87e4b8a2d76c6b38ad55be3eae13433fa620", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example000]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example000] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example000] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", - "similarity_id": "3278c02e08e01be35d5bdd2e3759d263c62c828e34575336d975961f3acb93ee", - "line": 25, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", - "similarity_id": "d2d56759b8a97d15cb9a54e80e02516c6cc1be6714fa63d00ac6e755d4a37355", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", - "similarity_id": "6c8ecef8f3c058e048123f1a01981e31abf1b8b2785f08d6731b10cc8b8cc437", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example0000]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example0000] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example0000] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "4177c00fe8e290d6685d5f059a2bbbffa018444d9f18cdd3e9767b109a0a4fa9", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf", - "similarity_id": "b574b6f19ca5a42f9d251f0ae4a047aca822bdd1058a53886a0a9c4dd9752395", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", - "similarity_id": "364c3a493b69e6ef422f918abca0ecfecfdc8d2d2a4bb07dad11779e1277d37d", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example00]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example00] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example00] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", - "similarity_id": "82bf61396f5968348529fd295b861b8281cf657c2b9d3880b1bba2982902a1aa", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[postive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[postive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[postive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "fdb3ad0c037b1bf4d9e6b3b9c0331067d78cf75b3b917f7a6027fe5a7f4a2b15", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - } - ] - }, - { - "query_name": "Autoscaling Groups Supply Tags", - "query_id": "ba48df05-eaa1-4d64-905e-4a4b051e7587", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/autoscaling_group#tag-and-tags", - "severity": "LOW", - "platform": "Terraform", - "category": "Availability", - "description": "Autoscaling groups should supply tags to configurate", - "description_id": "83cb6386", - "files": [ - { - "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive2.tf", - "similarity_id": "4b64336cb86910fd3b0ec7df632b9c21325b4cc3cf09b79ed6109a9dc54fe697", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[asg]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' is defined and not null", - "actual_value": "'tags' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf", - "similarity_id": "e4eac97be633ce885a0622e2a8f446dc9c27bd961fdebafa0202475c3c2df8ac", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[bar]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' or 'tag' are defined and not null", - "actual_value": "'tags' and 'tag' are undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf", - "similarity_id": "a9f0a7cb5b3de45f09f331b99d7df70d4ad4984fc647de044421fac9b46ea121", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[bar3]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' or 'tag' are defined and not null", - "actual_value": "'tags' and 'tag' are undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf", - "similarity_id": "e3d2b17430bfcc7aa31ec8cddede4d099f60b4ce56c137c4a06c4b3157d0aacc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' or 'tag' are defined and not null", - "actual_value": "'tags' and 'tag' are undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf", - "similarity_id": "855ccf9d37c241f1f932c3a9497082bec7de9e77618541262116e4dce4892f49", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' or 'tag' are defined and not null", - "actual_value": "'tags' and 'tag' are undefined or null" - } - ] - }, - { - "query_name": "CDN Configuration Is Missing", - "query_id": "1bc367f6-901d-4870-ad0c-71d79762ef52", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution", - "severity": "LOW", - "platform": "Terraform", - "category": "Best Practices", - "description": "Content Delivery Network (CDN) service is used within an AWS account to secure and accelerate the delivery of websites. The use of a CDN can provide a layer of security between your origin content and the destination.", - "description_id": "1b311401", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "a50999b453c2a91e688f200ed03da738eaecf52b045e309fbd8362d9ad020f57", - "line": 11, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudfront_distribution[positive1].enabled", - "search_line": 0, - "search_value": "", - "expected_value": "resource.aws_cloudfront_distribution[positive1].enabled is set to 'true'", - "actual_value": "resource.aws_cloudfront_distribution[positive1].enabled is configured as 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "19c7b053e95a18ffd075c07c51db2befd75a489bff933004a81ff386710ef96d", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "resource.aws_cloudfront_distribution[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "resource.aws_cloudfront_distribution[positive2].origin is defined", - "actual_value": "resource.aws_cloudfront_distribution[positive2].origin is not defined" - } - ] - }, - { - "query_name": "CloudTrail Log File Validation Disabled", - "query_id": "52ffcfa6-6c70-4ea6-8376-d828d3961669", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#enable_log_file_validation", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "CloudTrail log file validation should be enabled", - "description_id": "1d528dfd", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf", - "similarity_id": "a644ff00b637d969d67c1ff91dcd2180accff0bfe3e8857a5a3c25dcbf7711fd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "76336683b96b3742355aa571b6ca0cffe892c99f391d70bc92552d4f7c7fcc50", - "line": 60, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "61d53a9f6fedd7bed8f878030a1fda24e3a81cc70b86b7e88a28298e23cebb4f", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", - "similarity_id": "c7fa60d2f6768a67312d4ebb3f9465c8d9ccccff513e840291b467b747e8c0a4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "8d9b7ccb5c82e7f9905af895b1fa86f25da01bb09ba3a9bc30033c6790e9689f", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", - "similarity_id": "008058f43801fa2b8fa1b92a01cc24b355920d7957090072970c42e09a9d017b", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "db916720db93863f94607917068ec869ac3b500271ea13f854ef32d977f7d1e8", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[example]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[example].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[example].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "ce483994d3ccef6e0ac93fdf809153723d388ce73e29fdb8f9d1fde7469fa0ad", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf", - "similarity_id": "fdd5821e0c98579b4cf5ee75faa7f5e434a6aaf61aa05a65b4b48090e2d2fd86", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf", - "similarity_id": "0011f0ca60acd3ebbc298f6f6104fc924841d9246018fdc9ac265262534f1f04", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "79e3be003184d4c0dc2ff15c32d9b826757c1b7645a286d844911749ba528718", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", - "similarity_id": "b7abb2b55853ff94df0666bb3a67e22f1c8169c749044a3f2b65983d42c76341", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf", - "similarity_id": "75923477f39ba943d5f2649335e245bcfcf85d68630357379d21c9a79db36242", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf", - "similarity_id": "1aa5a74fd5e820cd5efdbaf5399c2d67e240e884ab74c98b9b570ac1f030f712", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf", - "similarity_id": "29f29b9ca0551f596f5a10c202b23d067a1a0f9cab337ea750005d97bc245eec", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "a670b0a5c796f9c50012b8971d72b52ce7ee766020e7752ef25b0eb561bfe57d", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "ee8ce3974034ba131e8ed0fccd9ac5b8c53b9bc60c5d62d8df65857f543fe769", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[example3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[example3].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[example3].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf", - "similarity_id": "db1b16c2d9f79c9c8d68042a82cf6e1872c5a29f6ab155482a9c1dcc3f25f848", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "d0fd62bcc627a4a265dbcf526a93ca11b6a1d60892512ee05dc633f99d4e405c", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf", - "similarity_id": "5e3a274b03e3eb27e9faab53b36703bb57917e05b8695a4deffb06b162798f3f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "15206ad120a03c8fd30ddb618bdbb98012dd6a71d949ecf1a073280d2ed3193b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", - "similarity_id": "ff65a715f530ab65b9ebc3247755baf7b51ff16e7e5f44851bc8b1ec3a40e223", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_cloudtrail[positive2].enable_log_file_validation", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is true", - "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is false" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf", - "similarity_id": "df887b84fdea925c13acd9ae76de9f88cda905b713f4f9286e29e86cdd6a8216", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[example2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[example2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[example2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", - "similarity_id": "6242d5ee925cfc828ac3814c0c30c3ece06bebebda18f581d0fe58b9fda73ce0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - } - ] - }, - { - "query_name": "CloudWatch AWS Config Configuration Changes Alarm Missing", - "query_id": "5b8d7527-de8e-4114-b9dd-9d988f1f418f", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for AWS Config configuration changes", - "description_id": "698457eb", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "28f87bb0f29a1c98757f28b377a63b8314b918e3e975eba584744032c95c2e57", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "2e076476ecf6a3f22f3403f73506d504a9aa9a53db3dcbe75e33baa57313543c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "59b3ec0f7fdd6a31c942cbca94e6a997dfe0e770b5db89bc742842a87d0030ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "074d53bb2102b9871082ade06d2c663285c0f6bb5105a81abeefa0140282df6f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "c94d127e3ed0c1572e0cf28a3cedf2b8fb012b324f9dcb93f3e255039c4caade", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "b62912d4a0d653b3859e256d083f82e889b2e98094fd55a3b76f6be718577c0f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "ccaa6439cd0fcc70434fc1484404cd2a18aa02df306f5ccaf71ebf8ff702f9b3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "9cd4244c2691de9b6ceadd71653340414d841446960942ea2ed470c136807e8d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "c6333e70a3f9835e5e9651674e5c1a800e6cc512d5e4c9fafe2ff0fbccfdd3a2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "ecefc086516cdce3a07e986022ad62b2df13a5e532fd75611d9dde322ba15908", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "b4ca7a986f97b9b166b0123d5ded78f3e475601365e5a049c061856d2142c413", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "b276336bdf94aa4eb10581351004ae6b00b74a1d0fd7545a16bda080e612f944", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "e412e90921de50cfb66b29448c6363e1e62d2ee0fdf27e1409f1e387b4365a81", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "65b4a94cbb3aa115a625e23a2f15ead1e443255c1aca3c2f69b59d6df5715343", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "a834e8872e49b3a752827b6f04ce83c4b87071401563c99fda0990bb99f92b90", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "0d226ae52afd4ce3df7f683f6bd3b23ef90690958379d349d277cac18f442943", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "44f5013ed83bd2ab95752d150a45c3611566646bf021fd9e07635557ff7f33fc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "a6269e470632414562ab4177408397cce637fc6702d293780458439ec7f54599", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "335cc2a7fcb18aefd2d8fb960bf5ad3a38f367499cbb74a6c0962095525fbc26", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "6ae20fa38ff7e1c97c2d046589a45c6b74c1e4cfd2e27feb4cab66204b930a60", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "a21f8539e1028b57564ab81ef706d0f757fd6668c6a2503c89b67d18cdb2a099", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "65a39bf06af3d685acef8c2b4b109951d483c63160ceb4b14ad591f18d2d6b6f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "043a223432dfa607862f178ee01b5de3523b883150f86c3201d48f06625557c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "fcb8555af68319cd26d1cb7269597c11b88b767f61aec40540a8386a9c894061", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "7c1a73d47fe7dcca24abd8250612afc66acfa873198a6e085cebb2808c4ba52c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "5b5e7e1ce37cb5537749613c15002a89b5cf3afe32fc9e5c013009bb47e4b8ab", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "04e9b1ba138b3afb3a1b7957d5745cdff05d32800d951f884db8eb79d4d09193", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "55ccfdb69438e2f921f85d9574a2f1318cddca42240d17edc1598470342539f8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "7cb19bad2001702b2b3a74a1b88fc09380ca5872b07361f9392586a68c6ea32e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "da6c720072286d021cbe6aaa6a86d316971819c43193bb62f0c8b4373e5d4781", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "b93c9b9f92fd3a703e9cd883479625d8a96834b08fc422dd32e8aa3cb0366cfb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "7529218b0891ec78e6d2d0feed8a28804c6d7362af163818a104f8e9a385e497", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "74671108c5a4c16a44d5ddd213aac8335882d66e56fea9f5a7696474f8055c62", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "f12c8016108020ecab5441d6d6c57e5390f0dcc6b34d8e3450c247928f5b6063", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "2c740cc1300c105688774751c276fbd5b850c66fe6bbdb7a5b53c50a55852b76", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "b1ac557a63053a01dfe8b382280a37ca1f71de8d3f640fe82ce274c307a6c609", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "2f39af1c579386638e083768d08dc27669271bb77159056b5fd8c8e978197263", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "1fcc438f115fdcc4c4754acaaf3b8c2e3dc07287500dccb02ef95b71f4cd233d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "02b8f48a29d1c0e79e3a6089b74518dab3065d8bf653ae42a4c030c284029c59", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "b300a1b2d46e4fd672fa8e71a773e10cea6e61f6cba2a2a13690e04c2be3c563", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "f3e520e4560f6259264fa7d38501fc7cab4bf57ed620c9f8cc4686068ea5e4bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "9081c8bef2daa3bf24ae285d9f4d95b3653b80569d293493a63aa23dc87048e6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "fa442d97d2facfbb9435046e640ace7af831b786f82eb492e22b8e6da169deb9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "7e1ed3f47b10346218be2a1dfbb39cf5898f221ebd5412ff339ea76dc0e80c3a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "b6d6912628dd64fda3d1ea8577682bc6d077b371854a23a42101eaef09b45b9c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "274df2558ff5ef7226542716f620e3178781b226ed625c035bdff8a951746f90", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "d8ae9645e2c534b4eaaf76fb7ea2af32775d088b36809660c963766c028bcf39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "f8405e844341b177a1383ebe7b749235ca60b7f03794e34b1f736de35a7ab772", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "9a2adc925423e4ab36d70969ad0a2ca2f12594e9eba011334ae620cca52d6e4a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "0277550cfa8d9f99d9ce3ac56754cf18a58cebeb04279748df8de210d52c30cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "ecc26d71ccc531303fbf652725b25fd84afbdb4b79f248d76ae147e5d8fc5003", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "88b2014ac2f47ac791682cf1c2ca53822d16f19ad6f3dc36661ec01eea55b05d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "4685abb28751888cd15122fa27ee1831636a7da404828faf024befac00e88966", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "a83c37218caccd906f54028f77f80f57c84e3230a390ac238a8a1661c9581677", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "42db9b5953ffd4ce0f43bba9ae43dc47554d7a3030d2df77a3bc68ea0fa9ce27", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "86180f0cd176e1fd3f1e75ac049556dac6016c46ff891fd6081fd0374bf00971", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "7752aa5a9968c1ad337779ea051b4a90c4e14b55f7d948d04ae2b97b6c29cece", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "8d9e5a04a5ba7f75c0b0ce8c5815fdcfe5af2dfe6472403d30fe85ba8ed41f6c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "049693902d84a83a657cb7e204806c9e88c5b57569283dc50648f0d6de07c39e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "55f260444f9b71bfb45f22c8c9d259360fae4cc2679ae7dcedf3d0d860dbb8d4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "1252ead1dc8b9b681b9ec987437bf5dcdf8d73b6621ad11de5276e782da8faf7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "647389548c331aea315d77f17a2ab165dda086d471d294e0e20165f9fba271cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "CloudWatch Changes To NACL Alarm Missing", - "query_id": "0a8e8dc5-b6fc-44fc-b5a1-969ec950f9b0", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for changes to NACL", - "description_id": "0a8e8dc5", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "6903debe27292f8b3c0a424a2597e9be6573dd2cd0aa36fa8f609d48912dbcba", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "485745ba95ec0a8997592fe4f47701ba55225e1b7b694763f2cdb2d9bf173bc5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "249352fc5abd4e080e58c75e6f86388079749c863e45a9ea977c7ee92af10668", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "d93c96fb13ae98878e434649c183d291d26423a361d1d358e2f49ad7795b058f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "65845737215fadc5dd2643d2e8948371b7357d5510a4277e5589df18adfb2f63", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "b92d35e9ded8e4d5ecad815f861f57d208830465e15785a40e449fbf7aa57c07", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "be76d95f00873a3b109046fb88cae8f4f93d356175cbb884fcf716e451cebfdd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "2307e0a5d574326cb23eb9511ccecc35ccdf134d402da6f0950cea9708f24937", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "94f4efaab306065c84eb1c7a9321d7d80254988f1bc7b40fa956e1dcbb9e8552", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "9ae953e7c2a5c4adc7b5ba35f232b0c71774fb74326a594516d16c6a31f5cc6c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "1433a773893e6eab9b5f3641245e35b9c2b48458d19a6cc184ce9fcc82f5a3a2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "9e157e89bfee691e474555ea313473faf0bd400f12c0a7b2c86a11404b83f8bb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "a844b32718ea690fdfd052a25fed490bd355e5aaf2e6cb1fefbbbf15eed09048", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "f9a50789122dfcce1819d1f826db0fd2de1f69ad922b4f01043658a63251a900", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "70b614d2064abcdc579b73ddd4c14539d241e7bd22f65fb2d7d66e3288dca931", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "6323b4c11ea7b1919b4f01d003c81635f415e17bca3be8fa8d4b89b419015f4d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "a7f7e4882e792cdfdbf05bddfb7e23ba51c4838d2b5c1cef1fc88c529b6fb76c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "159d125f26b67eb1859093536e003aa91b0942a199b17811fd5bb4ba66d9976e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "f8b527a9d9be588b6045d24ea1e2d204df7fad8d158f3d1942852784d9c7b571", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "71c4bd33bedaf8b90d98e1fd763d2a221285f1a3d8eae7e6ce80adf4edc62f0b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "7958aee25634b1b364c256b800df93bb8f912ceb42c9eb0fbef45f1749c504cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "05f279e147a429dec1aec7efb2c3b71fcc24bb3533c178fbe5fdcc164cc3f451", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "b714c77fa2f094d9b788b0b01896ff7ef3bdba01611fbebb3b6b098c80b5beb3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "465558f068b5c835eb1f7dcc68bbe5260c4434c283d2ee29f02717d02f2c0c68", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "b281b765980341e64a53da3483b543a1257f16ea3781eb54f786acf9f0ce5805", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "98a798f9e4f69097fdb1f53a2a43e4cf2e259deef094f28faa4ae844b991134d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "2f55fa58ea005a436fbb461a9e29d93d8b48fc41b136dcb19e15f7445ea47363", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "3f65270c622b900fa56da691dc85ad8542053e3f450b0e5eec1afe073dafc38c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "037110ae7740689f8d70973200f808ce3b6df9138fb4704356ac1984a2cea84b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "652229c4fb678aa74cbbdf379ae864e5c9cac99dcd7debc1d7d6277cf64bcaa2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "7a2b1dfd6aaa24a3633d750fde31ecbb6f1f45b8fe0cd40d1843ef1338f5bf01", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "1ff9187a94b9eb1b57a641b399804ed95ec1fa100bc776de6040ff03d2de5ac3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "bf0ac8dcdf6ee7525f7acfee11b66dfdc31b2f59f58a96c26163afdeee105318", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "689986cc262ffd0b41b1ec127317ea1862b4e5712060e492e1343b9bb4b34d96", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "df1ffb23b4fd72edbb9abc58f3cb6a971c69fc9bb0e1feb8fb8d4e1c02c0aea1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "b5cc6bdc84f7c0120c4876348826cdcd0ed29f64d05251de9cbf7526c0086aab", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "12477a036b22810870095fcd2650c3ec463536f7a035caa7446580655379200e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "2672d93331e77df454da295ad66151d5d163fb9c2f9beb9c2ee68627a5ec9b78", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "291299fe4a86c7f6bc03ec8a12bfeff6f0394da259a33ff06649aa9522910897", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "0994a5bbfc9f71c539061df8cfb663bdbc26aff30ca4d96a85046fc47e680522", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "1075895c6e5ca3185b3e7eaa8f67d5b131ddb6021ba901fe4504745c8437eb28", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "5d5c03f6c5810ea5eddde285e6d214b3f96f76c7f6394fcc3c38edf1f00a4c73", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "d5be0cefcc8a54578269bcfa43552d3f786d58d0080173cac06f9cc04958ca5b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "c77a4887f7efc62d54e65bbde23162a68698576fc16307e8483c93eead158152", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "648d6c84aae55e0cf6e43c642c77c539ead27730668166dceca10c2e1b4d7f96", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "834310e001b17c9e3c20b118c28a0cb2af4c75680096b58f75f8a5acd319e517", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "dfdb1caff5bfcf063775e47bc3489fd5d44e1435739e5b587916560afdb72e3b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "dd66f94a42a0e11a06b28d64ef9bacd9ff2c2f4370e75c397aca9e9902a2e603", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "463fa47b5589756f95711cc14ace2b5bbe6735f986ab021434c2fd58388909b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "b3bd5928e92f1a88fd2b79867da95120314d24de8ecd61d0bcac98d9a8914459", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "e9249b9bec36c56155b2a31240e8ce4da6a71583c0795cc43efc7e2f16bbb5b3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "291adb3d12d2527aa0ab1c6352aa4df64aa7bec549385fbf4eded296e1d7e398", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "9aa19a3c50addb7f6e3cd910aa7c0df76b9a95428de4502e189ee9cddd0bc00d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "6764112c98ed214c8fafa07c98f78e8361672d7d8d02e4d2278732cde894aa30", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "feb61d9212b82c4f0a8b26ce2a6732e338bfb30b7ae0958e219a415ab131cc9a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "ba017180f52f3205ac4a95a0dccb8d9ef7b9e91f465136c5020b92f87b67ae60", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "b2046312cd53cb96dbc6e4f03e68813cdb3e45033fc4396e71d50070f65418fe", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "ade7006ffbdddf8a86374dcd4f9e6ba5e6ada45d6680263004f9f458988a2d44", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "d672914d3abe349fae6f44fce8e3207696137b0ef7253fa26456793024f9a399", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "cc69dffa94d82474ed937d70bd84582846c69aea8eb156a0de3e836e4e90da58", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "91a5667d72ba097455047c306e8f1c3fc15aef712396476eb8027a2c12b481cc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "be22f6deefaa0648c755ac4d9df6b693552676b562cdfc0444577f717b75952d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "CloudWatch Network Gateways Changes Alarm Missing", - "query_id": "6b6874fe-4c2f-4eea-8b90-7cceaa4a125e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for network gateways changes", - "description_id": "aa3e331d", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "3b23051ef50faeb0b44ffe056697c4f9534cfe36ee95a797a6dcfaaca11b65d3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "72eb98c2d2e83856ebc61685892701facaeaf3333a68601d8801d8798585300e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "336eeb58d45806d01927fa831e1e6438b6105a8d1205bfa2edf979b634e61be3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "6948b44813ff70d53b626d93cda53332f572be68cfcfd3ae54a863a7a49a0279", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "f156927b8f94fed6c5d07af2620a53c278441cb1c66e9862b687d8d40abb4285", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "b70fa2bf38bf27c514359c6c451b902be1a348f27688fa6953b6ac537050a793", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "58ac88b9422f86def946c1cce50cee5e86287d88a3ff0e00623dac784a3dbda2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "3b0d523a12cbceffaa4b2e933ed1dc37601a5c2c2ae5ab9af6f04667618a3a85", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "5f041053857cadb0774e8e8e1fa83001df3b204fd5227542925f3d666fd34ce7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "401d4110b6d1657a4db7bfd73f5b33be2cfac98f346667611ab3183e561e391a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "c93f9e28643027830395e95a6e1ec88523c65ae458de2b5d91d372e5f0fa398c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "5fc1cecfaa01a5ba4319bc40f74126209c5f6359c311598b59d4897eb035818f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "74e8c7a5f913805c1c3120cb8ca323b683ad3911acc7e136aca206ba88eb9d10", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "41a04c0d0892ac538682268f35850eca087895a6de3651b0b5c59b5abfbea6d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "200a8bf334ca6bd48a2cb467bd12457dfe5293079963e67df042f3b562a23ee1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "c142860e6a4720f16956d9089f7335eeb38aff66e9909f2752b36ed7a5cca024", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "874bdfeb4d4c377caad144c24759530aeb9c868e05d9c0395c39cc29788abc21", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "dd840fdc51271dbc29fc6d639f68c8b917687726f23f5568ee9e5fe6830f4e82", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "728fbe9f99d91aadffd4a604026001f54e54afb2f8eb907182d5e5c9ae1801d3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "28be4d164a460322039b32ae22839e3e05239d3384eab3274c53e982b2ea642f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "bdc8427bfbcaf28d8056c0dde93ab3e61f271a93c1fd82286030764f37a11009", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "bb9e798bc79c461d373bf3495826e6d2cf3758a76e83b8d73452dffacced96b6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "632002730849b6dde19e1f95fcedae79fe2b446fd9fe6467fb992c23dad07e40", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "c1ac16b479874f7eb9750f0c4c03848f7dbb2fff563581a3650de74a533795e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "ac42875da20a5dca32ca257af03c8ddd776bf2d40904f6a730220082933d3f68", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "d447febd06bd32d027b3116466b5e41f4d26975a305b0a8d91afd0ae3eeb10f5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "09f83dc75b82b907d540ba959a3241d2cdc5a9609f59fd95c85d1cb49c4ceaa1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "42a0056bf2810b9f2f23926da45240d646f39dc848e218169fe3554368d36e1f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "7cbd47b5e6bac6df1e7cd8aa2556dc977381dea6c222cafa19f28f96b0694944", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "910ca628294f24f35e935b83e45a9bed21d8dc0df1c648688147f2d5096d63d2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "385f84c9a828eefb9866de2d4ba6c159e2694ed1550a709b05270aa89d9e8d77", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "fcc6c07f8ad7d0d415d6d37c584bc0c1857c4b92e2f1f8d90019736b86042a21", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "665038c4b61988f3c75cb397c06946d787823eff54afa9247e2a87e4d790479f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "8fa4184becce81c1a8712a8424fccbb2209cc32c499b0760be24ab6b7bc36c8b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "b57e7f711e5288c7e68bb748f25ed7ee1c18dad137ddc4700276fbbae4d9509c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "c1dacad7a3b1e22ae90cee4a9acb7b6200d3dda20aded774a0cae23b4cc2c6b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "c9133dba00e783e02621aab9ae721e38c5e2feaa5d023505807b690a8f78738f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "951ecb0bcb86b80de8e2535813e4060a14279914f3d789b4249dc1c569d62f67", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "b945f43cfa089d8ad757d1fc3df7994c9a14023c81e5675df6399276f1e73419", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "85f0cbca7d629baf95da3463a31d11dfa3da24ab7e3899192082661db11cdc48", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "65611ed109b8c52fed5f6ab3c242be0dd510c9fa8a8540ea8c5c7c1c465810ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "f8cec98b168eecb15f2d691010096a785e33ce6a52dc8ff678a26054b47a59c9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "edabe700b3bad1be302d6fd547c8f137d44947a8030c21d8b83f88c9a9427997", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "c2f89b882f00d3a20fe3181e881758dbdcb5ddd94a4b5f2db2e83542b992b55c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "b44d3211e8ac140ad48b30f1406a07c08f6d5288793756d35fcadf2f8e9fb4f9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "e827f68c19ff9a19243d5f79dce8781505fc34232c31f6eca43071bf4a39aca2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "5294b0970d4ee5046af4bba0608fb620c24a593c168205fdda84100c6980a7d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "869bb74e042641698a9e7df1675f5903207e1d588ee5babafa72a573e07a9516", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "4a53fcad0c85593ef2bfbe82526e4e172307ea6be50bea5f247f0a6da6f73973", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "6f3127d45094652a171a0cbf10819d296645397d4b641f57fd5535920c365408", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "e5cf9d34b2f053c7a473a6a9fba41d29f512a46e70020b5447558ca25e911851", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "e1e179f493fbfd9c7017ef570dd253f1f8fe9336962af467a925ba875b1e3075", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "5dcb6d07e329415a468aed124837a2bc32033b9a0d0ecf204d41788dcae893ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "a72df7df02e361991c3a2e11969dc6e1aac724bcd165e201c13be1f563171596", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "36e1ba47ebd74af7a70aae8b49f7afb2702b9d1159e394fc8db8d58d521b4b59", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "84a55b5f1ca8ff66610cf824cb204d5e23484c0166152fc60df88f7674da131f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "ad248dd8fc79b68eaa1ab978d53ddb62242a937fb0a91d57a5365a2468a97d83", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "b7a4fa2b37836d1d5a6bc6406e4ead9f195fc71a15e25af3e36d209c023d4de2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "66bf5935a275d3549a384506e7907a773410fb137ed7a99746c048a889e8ef0d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "b11a7784b2e4e061be0bc6bf6d010fee5af6f0834d07e2dfc0c6fa8a18763d42", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "4270ec6885597c3b4eaa91a0e1718b92a380c2be79d674745d04bed83737a536", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "264d50985cfee37b425d82f87e07d904a6f0df08fbfca0f1fd2ac4173d3918c5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "CloudWatch Route Table Changes Alarm Missing", - "query_id": "2285e608-ddbc-47f3-ba54-ce7121e31216", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for route table changes", - "description_id": "de601959", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "5f4de854b65c2f67683eaac8f6780fa56fb102c267982ce4280f2c30a7910c89", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "3fc8da94a2be9d30ca3cb2f03a6451d5523aaa373521d041e81b29c1889168d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "8d5792151098a66a1aa429d7ad4a3f69a7d531f30319a36de2acd80d22b6ba03", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "9b6417e4e20eacd7ef4ca63399721bcfcb618825881856e250cf1761294ce887", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "744004275ac12a397e73ad98b64a5cd8c3b9ff618d9a1d4271225e8d02af2cd6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "9010c5d88f95cf61813737a6be3c2343ec1f8e9312edb0fa5e251c5274660ead", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "fcca10ec92cb5db4284e2ec27e6d37a41193111579754c5b369531c563fd8f86", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "dc2ec4c61a39af10312fa4204c06967c8752eb128e0a7efd34ea8eee8b84af6d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "e85ee6b2c7910d2b1e16daef14afd4327a9e7c227f5cf692b59cede6b8e3bb45", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "4408b8fe65e29d894f70352519bcbec360cb750aca4c70480be652167ebc4a75", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "299cfb68d22bef4f83c848a7a4b94304b55a164b3ff29d3bb68a16de33586c6e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f3f91fa8fbfd3392008c6862290df9f83c645e81667dc99ffb6195f78ac2ebe0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "818879350d986f73b41becddc585d19bc13b2f6fb78a2997d81c7ba2bcf252d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "ce09dc668248c96186d24abf7905f43e53e0852feb4cd52ca5577d9a72713c84", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "fbff85124c847bf9a5a6cfb847ac2a2cdcee5a7e825e245479504d18d3bf526c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "8768dfa6fd9811f173cfb1db02dd8dfbf1fe6b48af944d6b72f6766fb25f1ecb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "408fbeb6c77dfa85b16efc3671db86f145a24c09266370a0148738515768cd18", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "43479d6fea094c3a706b398ec57d24ac7fdde35bb06a69e762a4822ae4649559", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "a5154b5e8653743c074ead09516866dcde8e4799ea6cbc44b3d5a2b0057be7ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "a898a7ef8fa71f4da5408b8ad7c78af82528fdbb5c1d44e9d6decdf686bfe102", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "bb67d5d84aab9dafa4b197421386056f13c14b4e6f329b52866157eff061e52d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "382a860570bc6cba4f8eb326c4046c1477bb1708c31afa90afdd32c2a99571fa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "c51474f8a7f6853d09b919fc90a88d48fb8b23def94f563c306623f043af7f54", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "09a16093c3109ee2cff2c98b289325cd8036fb8fc2602c21b1d7bd761fd97550", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "68b9a7df12ce98bb30c54a92eab0424eec55074c704d5d6de565dfbed90f52a2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "d573532eb89d2ddf8a48a7f221f7dac0e5ac26264a33a31f7631152c4c593abf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "3f9dae31110032114c585de5b64363a1c91afa6fec91f56e4ae8c2ea7b444c16", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "8fe37bf227ce3525cd879f89a31a02ea131a25d682b9659205dc0da19992001a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "1346d996ef997a03fbab68e90c6b3a56a324e52af6898509c4fd478888f2752e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "7521c790f8078a7cb377623e783f103d392dfa5fc911e066f989f7ca56ec1c4b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "782615d3c12204944dd01793feb71678fcf038a50d61382f0039be4a0a5a8faa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "58f395815f35e5edeebe7c8ad1bcbcb96a7ad1b43e0805e04f047510f6ebb95c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "54cb927716e2e78f8abe277f1b63e1f261a3b53096935b1394aa5e062af28a90", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "7f2d6e125af065b98c1706512f9592821638c70f7f3193dd45e83d5c58429bd3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "bfc011b73cba3e2415398c442629aeeb3feb435e7757e27d72a24ca43ab56b80", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "85807e5bd8ae70da946d69b52883008be232c84536f9ba7abae56a35b214152c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "4a824d05364ddcfffb9f1519ef230759527e14564a9364f1f95d8957ebc893d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "8304bb77d73cb94b7dab02387d5f72a42d396a0ea3810b72124dd3e1ea6ad816", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "8a5abde40e2c5082485b9aa07bf9790d7bfc79574fafdd933c19722520cf9522", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "42dbe9c5904dbb08473cd0e66b2c31e3e4efd2aa24f78751eb5f38d9ad46ec74", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "274c213fe5ba284dfe630b901b949ffbc3f5e57c025dd608da1e5f11a47a72ef", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "b6dcb9d5dedf19bdaff7106a5b11c0a2a13afb11240e32247d28afc5818939cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "3e35a47d4d4d42ff76ea022597476a247967de21f9059c90d00d3e43bd6992be", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "18c17b09f2aea09de7ab2490d8276d36cae7e80f12f7dc248ca1266265662652", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "0dc872dd2c1e46d3532c5031ed8bfb552987ea3001b8e9ade07d726cd00fc26b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "b478f7cc1cfb08f95ff8b2248e9f0072844fcb876ee7f7cd8a452c7f13fde6b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "d418fd73f9e54cd84b5a3861e394348803c5d41935952217d825b9b3beac632e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "24ec9eb2d1b4d2ffb0d4bff6e140b603321fccd840b471ca893b98f2323cd7e3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "c31cd39b7fe08018896cea9dd4abd72fd25f1f10102cd02795827958f562b394", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "9a7a046f057673c9ee9d61cffc4082d8f5f2880b233ebabe0f73b4fc1d746842", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "fbd3e216c154ed0b7d4ef71c6ce0f83fcb9d468c44fc32e61252dbd1cc8a0bdb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "ddcb2be72c6172120455bae21d1a2df73c56337aacd35829917da6351b4b416d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "7d6b5e8b4c7205adb3debafafbe424a43664e9270d98b2333d91d50cc357161d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "be7e0430dd9d7d8cda1fd68465f958c6fa08f92cc543c60c506ed98c1ae93806", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "4e8ac4f969157ba544337ae63db2b05c54ae32f709aacf4ab2e4c84dc79fc542", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "a2845656a46d520d08f05cca7d4e18edf5122da36d648e7f26562f48fb6d1d49", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "c8d228540fd790bc85d4631b3fad2d576112bd40856901e80487aeaeb6b3c4ce", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "16ff25fe1c0d12c809b2513f66e868295448666c1998aa44a5e288b16578e77d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "35b04d8a9f78ff67b42b747ee870db727dac015805c7b4f6e6bc730d09731321", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "9b7d2bdcc84f0d91ee7e17a1631e4282954f1e92381283b7806bfcd120bd80a3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "08bdd5f12695ad3fa4c759e50f952c0264ef5a264f807f8a01d730b8b061fbb1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "9c8ba3055a2aa1d520fd5dc051b959e8d4451b078fc05e8b10a52bcc1c1f9cc4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "CloudWatch VPC Changes Alarm Missing", - "query_id": "9d0d4512-1959-43a2-a17f-72360ff06d1b", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for VPC changes", - "description_id": "6159556d", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "f78c4387e5a3d3c800b90bb179938fa2a00a902a2b6d141629d6710a1a15a3c5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "3eb6be622cd81951dd69546d846297283a8048094af0c466a96999e4268dd310", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "9b12d1e66bc898859bd8d6ca5f91ce8d4c180f298b59708c4a0b90219c565d15", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "93929468076cef9bc2dd1f31dfcf1fcf4407a88c1e2b5b09e9257ef60e9529a1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "aabf760db73489e89f5a362d649bbdaafd55c508c2d61bfcdde07a18da5d6c01", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "fc1773e959a8190b2cd1750a833864aa436600d8c0805ee124d481e7c80ff8ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "235ef3c222b16c81d2f1a5b501b998f69d3e8f8e744e828eb58d97c295e52d01", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "71eb4314bc802ecd15f9a58b153e157bb2fe946c263a17a85d5049104aa80ed2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "8075e728d058c0f7f98cb65180beef6636fb788339c58b9699de5c2b76b89705", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "e57d99f09101aa8733a3fcf31c3238c3ac965e13e60c218c808c9bfecd78066b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "62b3b1f39ef150054e8576d5acb9529b1fdecc921a0533c2d4fdfb1a90b1e3f3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "f7f31cd7837eb069c7840749615ce89c4c72a8b3bd7c81a7f3b570abdd91a3aa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "41e1a5a2b98d81369f7266fa736ac8cc4fe4a1f0db99ee2cfa9664eced06df39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "43da36605491c399f3d009e25bf77db4572ba20c84825b0b296bbe145f8d6d3b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "ca4fb6a5313179fad4fd8afd7a7f467a16f4294ad86b47d17aec972127406788", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "30a647a4997f43851b5e73006547a61a7df8f601850feb1e2812ddf23c498acb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "1f1fdf2736d9401518c6705556d366a07ecff33e4d220715dd1a1017084ee8cf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "d87dff25ea446205eff3bce27baa6083ba82d8a7c283ae9c7aff4f0c15ab0382", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "2d8cb2554affefc7fadaedc282082eb5e12fb635c0dafcb59604355f4e74374a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "f5495de9230c5ad8adccfa79a3f05b27904720b95d2f92a451d356ef856bd5b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "b2dc1cadcc721c30bdd3bd331105f6f10b58177a8dc0cc5a6d3ebe497468aa0e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "8bdea07bfec18400f9f5606ff8c51d4e5205d43cd92341a8c67098d6053d0eda", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "ed47ae20c9b65e049849d6de52d8c98eed9e56cfd5d2543c30ad8fb1d9adb59a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "ed19fd4ba86ee48e3e331b7c7a84a32c69b3c066e89ce86a55e7c2d9ea1a48b7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "3c6a380b65379e454579905cb146839aec504dc65851ca38e0ee4f28a5682403", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "8a11c75c62da0b3e476b15fa285b6e9ab0ab15d7c09ea87c3e8e917c48fe4974", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "1677ff343f734c85312f5271b3b458f8ab35cb5c180cfae65b0a715c7d657b74", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "82bd442524d21326497c31080dfec42cd908fb679e3e4f446ed3b46c07c6ca43", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "5035d36d56444f548960427a10a0b8e19ef36d58c643d75ec907ad4ae0bce75b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "154d640130fa237b2a736372e9e435563e38420c126b43274ed973dcbe8495c0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "72df2ec0c46e40447b2d415f559521b078753f15a77d322688d24c05583810d7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f8c4b0583d63bb7e1003c39946bb1dee502782d2234c4ebe636784513c2a439a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "0b9cb397e700c0bae275fd6cc0e3a07ebc180761bdf245eeef8d8da348b5519a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "b9ce2007d1ef3f76125e7a6e1fa34712e959a18be2f616089801cc0223c9a33a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "771c92742ecb061b7622dd5a00e156b5336339276bc0a28944e4cffe6328f9ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "abe8f41d49fac229bdf379fad6145ba95a8ab80a6a841c63e36633d23587c0e5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "19104bd661e8e1a4be741f6db3c057c4d105929dd01d6e652f481af71ba29972", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "98d62797501e521825edd8fd730c8bb014cb23d6c10ef0e93ff1e9ea518e2324", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "68cc9c5e7d311b50531816623bfc2ff99d5e1cda0df1ddee7c3ebc19a73c4cdc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "7a1ec01d5ad2f9c26989664f0dbbc6d0995a015d78192e568f29265eabd8a0e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "bb5bccf311faeb93a7231f345e83f4a8cbeaa9a502bf5fe09a68520dfdb941cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "d3ff8a30e1a04eebef8b36665c016818c403661f1f450fd89d4af4f030179826", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "3ed651176f008e3fcfcc3b0b44475b6162818db767d56f9757a745a78553d0ac", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "6921930607adf03a8fb84dafaa23cf6e4f01b644538b419d56f4be6da4499e61", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "5f63a8330663349641ae2ba4717ff116c26798b2c2099f2e2a6a3c30f3445cb0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "ea9794bc190133c33f31e2961690fa5369a79e9c98693924f419682d2416d10a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "f8409fef601d328265f9c8595d78f3697966b327198543e1dfe74e564f0f09da", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "4de7ec03f90a1a0ab5c4dc30fca41900429e65318542032631370079069da1b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "4d3548f002c256cb97d6edbcce6c838f53c1c0b959fb32f682a7a262a9e3f837", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "e59fbbaa754ac18e15835af9cc0f983ca3ad6231f9737794f38e8902179c9dc4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "856cd1946e9fffd710aa6544894cf316e7ba68ffe28474326674df86862d18e8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "f02c446f87b5dcb41cfdae80cbad8a1002a652a235976efedb06811c07e4f711", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "28b6b122ca98316681a2ca6434b10b82a3fab327214faa7140426637adf89443", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "f247aa47069ccfe50fce9945e4efa95a157e8c3cf087612ee11458c0a9ddf49d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "933ae9755689363c0ac942297991008be76f532c4f8d67e4514deac1ebf6815c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "d9ea1dbad6228d3ff28802bb4c4befd739ff5bb6b224200420201fb77746777c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "307cbc80158aedd51634508b0b9f661610131d2ccf5c1621e22951fc3ea2c3d3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "0c845d82315f1b992b49ff4940d80377bc165f2c19073e459b9242e532e7b9ba", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "3809462c9f6aa7145329e83e7ae4660c86181907e963802f4762ef092f001450", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "84f8c06f130b93e09dd4785ae74f25512999582d1781a3551da76ba32df96c21", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "c5e252fc71a3990d7f0bc27b8cba855f26a20389fbf0f5890088d66d69c4b2cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "017ab77d147cfe88489aa58ae9a12e14fc69176d5347d483c9f5c3dd2f2cf29c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "Cloudfront Without WAF", - "query_id": "1419b4c6-6d5c-4534-9cf6-6a5266085333", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution", - "severity": "LOW", - "platform": "Terraform", - "category": "Networking and Firewall", - "description": "All AWS CloudFront distributions should be integrated with the Web Application Firewall (AWS WAF) service", - "description_id": "8fa5ef1b", - "files": [ - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "614ba989c920734697749e1246a49e9b09d9db8eaaead0134c48035869e6fced", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive3].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf", - "similarity_id": "74e5b1ac6610157f9753860776e3f2bb26aae3d70ffebd5c978f7409c412dc30", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf", - "similarity_id": "8fd5d3f1e64c52c665b91ce0ad5c24b1c2d45cc2f59e6689228e64bb22e9a50a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", - "similarity_id": "e61ce49e54b2e99fff2e4d13dec99fbe9f0119c03c3bc1bb122f225e5a02ba16", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "94ce01e7edb2ddddd7727bd1e8b7a4e8d026685da1e2fcb525c4b77eacd2433a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf", - "similarity_id": "637892cd770753a39b05f680e94569adb73dd3880e475c7534cc35ddb4413238", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf", - "similarity_id": "11112b047d2b794a69d3d92b67d95448f58c3ee5ef592304d70eac0f70bea1cf", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_waf/test/positive.tf", - "similarity_id": "e54b8771b654e3506c1649c60d713aeaeb0cb20d50dc8f79cdbfa23f647436b1", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf", - "similarity_id": "3c97a44d4372669f0bb1ade1e55e160643edcc4544c26a6e3baf6cfb0708c45a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "0ed44be96870c83d8f3ff83f0ed56b2cb50a221cf7383abc70b6f41a7ee121f1", - "line": 93, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive4].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "f69b0a30cb7cd2aa05cf24afba01584fdd00ea4d6d83b9123e7590b861bb8ff7", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "decdc872d4373042167414f3eb04e440954c03da7a00298ce1ee45d639f5e943", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", - "similarity_id": "dab7339ffcedf08d0a9f9c035892fb47e421ff6a49ff842ea019c403eb76c012", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", - "similarity_id": "2890871bf4c747cfe2a40230381fd3fc41f94e714278da51418138604a2dbad3", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "b57fcbc3947500adb08854118b601a4fd53312e5bf71d4f3ab5ab04f9e406970", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "c24f3424dcf5440647d32ca99826c718099f0387d6df2a9e5a9b2e585407025e", - "line": 52, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive3].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "3a1fea1ab92c64433b9744422188808531d5d557758d5c3104ea89a1cd6a6efb", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive5].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "0b651b88654cdeb77c694c5d866fbcfd70e486fc7790e1373c76aa5032205ecf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", - "similarity_id": "651aaca58a1616f445eadc407753e6f5ee3234622043dbc2909e4d87aafbf1ee", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "ea2436a00b727f768b593c8066f78f12ec11ca02aa507a9cccf5a4d51104264b", - "line": 24, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf", - "similarity_id": "89b11af93e7499b0fdef7ab3b7dc499646c39536dd9ba00131fa1cc95626b97a", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf", - "similarity_id": "ee07c0db46cda988efc438b430114a881c47629ef376a0050bf7e86104641e57", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "c197cc682669f747680473fc43f47c02634c6f4b04bfde2ed97fd9dd30d7de15", - "line": 80, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive4].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - } - ] - }, - { - "query_name": "DocDB Logging Is Disabled", - "query_id": "56f6a008-1b14-4af4-b9b2-ab7cf7e27641", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/docdb_cluster#enabled_cloudwatch_logs_exports", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "DocDB logging should be enabled", - "description_id": "7a864a61", - "files": [ - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "8f12796b960e04e4f65cf18cf8cc84471173946efac2720160c616a69e74910e", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "874f5afbad57a39b95efd136528556452f0f9dbb9958976dcdc2a67a884f4723", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf", - "similarity_id": "45a315e81ffcef96e753ab25c26e9683775bf58e89fbfe041d4a2ace5bfeabd1", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_docdb_cluster[{{positive3}}].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: audit" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf", - "similarity_id": "98893f97db03b6aad45ffa7ae146dad1a7351000186f08255c2461ccb17c40b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf", - "similarity_id": "61cb676a01e8f49da419c2dcc14c68da0bbc4f4bcaa5bb6ddf0f9a281c7d0977", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf", - "similarity_id": "859e9b8b1bb4442c840d58a5f63358a5cc363ec4dd44f99b377e99e99f60601b", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_docdb_cluster[{{positive2}}].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is empty" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf", - "similarity_id": "2e78978fbab4c93daa78087d6e937893d52cac0c3c626db8dcb10dbfd4a244b8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "8ecbd41282330a2ab81733ee362b72448ce57bd6cc3d0e4236fc03505f96ba4c", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{test22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "756b22ceb308d139e2080fa707269acd4e4b9a90219039a8254d47722018c707", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf", - "similarity_id": "bc3f1b2c18ca435da800633338d7d4cb48a7e4ef20c9fdfbb4aef26b71322fa4", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_docdb_cluster[{{positive4}}].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: profiler" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf", - "similarity_id": "38b3732e02cd499832a6b29818dae2aa145c4ccfa32321925deec5ff43495b62", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - } - ] - }, - { - "query_name": "EC2 Instance Using API Keys", - "query_id": "0b93729a-d882-4803-bdc3-ac429a21f158", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#iam_instance_profile", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "EC2 instances should use roles to be granted access to other AWS services", - "description_id": "ffd8ce80", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "3b9048ec403ca5568afcd7009c62f7818c33de5e3c54bbbc22ebe70b03008213", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[positive9].provisioner", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive9].provisioner.remote-exec is being used to configure AWS API keys", - "actual_value": "aws_instance[positive9] should be using iam_instance_profile to assign a role with permissions" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "1d31d8fd477624e1b2bec35b5f2dbdb2e0a2952d6932d97c9e5accc7e1dc6ac6", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive4] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive4].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "8b960cbb8314ac6223873176945424304c4bdf8895a46b3c6ed31bc27e20c582", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[negative1] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[negative1].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "217c237e4fedb4f26901ac634a77fa3f5a038f77e281e20262c4227a375f5246", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive5]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive5] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive5].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", - "similarity_id": "b25dc52221b54a4d444722c6c1426ea2600b883e3a8902d2103b0ad67cd7fb39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "f0b088791ecd7665268128f96ce073fe3bf5770caf641d632f5a919cd72bbaae", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive3] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive3].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "66a635b9822727e7f632d75ecaa2e8f433f02707a34b66803d159d83d8c3af23", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "2a04a674a6521a4d42415d33d3c4dfa5da68ae752bf96e7e6d63961ed032cd02", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "84d74e39b8bfa3b2d7126265dcd281d632737137db2309bd687414473a055f76", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "06b2706778746d1f6a328132e6c8b0d7a591d5e3b7095a553b5f48954e7ede4a", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[positive7].provisioner", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive7].provisioner.remote-exec is being used to configure AWS API keys", - "actual_value": "aws_instance[positive7] should be using iam_instance_profile to assign a role with permissions" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "7cbad8835bcf7c1a276767bfb2f12ecc7c4a82821becc219509a56941c184161", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive2] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive2].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "e172b01cb18ce6733142f2b15df47b8abadc50dd7049712f835b5d4cb8758411", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[positive8].provisioner", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive8].provisioner.file is being used to configure AWS API keys", - "actual_value": "aws_instance[positive8] should be using iam_instance_profile to assign a role with permissions" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", - "similarity_id": "510a8aba1db8ca85d154d119507f1071ca6d17f53c55920ff20152ec51674cc6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", - "similarity_id": "239ad16a6d0ec2682d109bf01a62eee515b0f6402dc6a645e55acb33c022d54d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "4d02e13e7176172a01c31ebe82649c010717abf870eb661d2497a6641ae161ab", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive6]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive6] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive6].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", - "similarity_id": "50259ca980dd7c2fcdb79a83a03b8b0664db76b63e673184508bbc2b24df3a79", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - } - ] - }, - { - "query_name": "ECR Repository Without Policy", - "query_id": "69e7c320-b65d-41bb-be02-d63ecc0bcc9d", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository_policy", - "severity": "LOW", - "platform": "Terraform", - "category": "Best Practices", - "description": "ECR Repository should have Policies attached to it", - "description_id": "cb9636f6", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf", - "similarity_id": "61f8661cbfe9003245484573a2b55043d4746658682994710279d0012ae554bc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo] has policies attached", - "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", - "similarity_id": "fcfc88f5d76e524fe25d71598bcd01ec6e7c8e22c325d32e5f1e2e074223810c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo2] has policies attached", - "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf", - "similarity_id": "eecb04681d7dbe9dda52097a1f00e2ad386f4d087eeb0158379b08748bf2a8ba", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo] has policies attached", - "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf", - "similarity_id": "7eab93cb1a5b09b51350948962465e8b963389e244438fcc02ea3a88510c255a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[negative1] has policies attached", - "actual_value": "aws_ecr_repository[negative1] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf", - "similarity_id": "76cc7a9461ccae1d77aabc54d2144139a0b701363a0072ff1672d0f293f9f76b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo2] has policies attached", - "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", - "similarity_id": "ab39e455167805805c4cdb1f557862c901655f74dfc3b59e8e1cfcbaae11a2df", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[positive2] has policies attached", - "actual_value": "aws_ecr_repository[positive2] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", - "similarity_id": "41d8b392ad235c3edc21ad1949cb2dea672f8b2eb66f34c6aa034806305fa8d1", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo3] has policies attached", - "actual_value": "aws_ecr_repository[foo3] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf", - "similarity_id": "ecd63d0819ee39da31f410c815a244766cf42f32cfe0cb4c2236ec19db2b3259", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[negative1] has policies attached", - "actual_value": "aws_ecr_repository[negative1] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf", - "similarity_id": "92a07dc4b4c5d1ff71a7894317c5ec66fc318281499385282fc6ae148012ee48", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo2] has policies attached", - "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf", - "similarity_id": "a3a3b0ddb0c3347f42fbbdd1a3df6a05be7fc4641821b5b94df24172713e7a39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[positive1] has policies attached", - "actual_value": "aws_ecr_repository[positive1] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf", - "similarity_id": "6e70fd5a74b4785fb59ad8ade508ffcb22add60de80d56738dd010ef90d79f8e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo] has policies attached", - "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", - "similarity_id": "928eb27755a917965f50bc22837bd086a9720e3a3b408cd92028b49246daea36", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[positive1] has policies attached", - "actual_value": "aws_ecr_repository[positive1] doesn't have policies attached" - } - ] - }, - { - "query_name": "ECS Cluster with Container Insights Disabled", - "query_id": "97cb0688-369a-4d26-b1f7-86c4c91231bc", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_cluster#setting", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "ECS Cluster should enable container insights", - "description_id": "b48a7a70", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf", - "similarity_id": "fd7ce63ec0c27eede371cd75faa44d20b7857668219142aa30643548b1ce7a46", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_ecs_cluster[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_ecs_cluster[foo].setting.name' is set to 'containerInsights' and 'aws_ecs_cluster[foo].setting.value' is set to 'enabled'", - "actual_value": "'aws_ecs_cluster[foo].setting.name' is not set to 'containerInsights' and/or 'aws_ecs_cluster[foo].setting.value' is not set to 'enabled'" - } - ] - }, - { - "query_name": "EKS cluster logging is not enabled", - "query_id": "37304d3f-f852-40b8-ae3f-725e87a7cedf", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_cluster#enabled_cluster_log_types", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Amazon EKS control plane logging is not enabled", - "description_id": "80a41f88", - "files": [ - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", - "similarity_id": "ea23cd17cdc6af671a04d24087afdb603c526339b6bbc49b3a050ce1a479953a", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "9af86bc9ad868c65f393ea73969843547349912266ffaf73998cb7bbddf1c300", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", - "similarity_id": "5ef537c677a6afba218fbb49a0d2912a9ca4421dbd290905794a4fca73d147c5", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "aa38638821da64182ba6325b3108229b568f6fc86d8e34bf4cb54f712ecd3e64", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", - "similarity_id": "12e2f7ef77d7217d1efac4505c8f6ffd3dd1bf7f74da0ea29feaabf853a5cec8", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "474ec310269cb47c2e8c502f9780dd00c88229c360f81bf46098b61de4b09566", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", - "similarity_id": "acf0d6fe41f3ee63b4cdd8dfd44c11daeda14f66851c0fa4a923a108f5f4311f", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "506a86eef7b5f37f51868cd6b50172d6676e2ba4e9fa298ddb40b2474ac12b13", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "7952c870e2b60992948cb69971ebf217cd3bbd3ffa20d1aef570779e7b4c6c3e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - } - ] - }, - { - "query_name": "Global Accelerator Flow Logs Disabled", - "query_id": "96e8183b-e985-457b-90cd-61c0503a3369", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/globalaccelerator_accelerator#flow_logs_enabled", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Global Accelerator should have flow logs enabled", - "description_id": "3670731d", - "files": [ - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf", - "similarity_id": "5062e9e4c9a1fd516ce32e402bc055890601539522e8e9970dd89b7d16609e7e", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is true", - "actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is false" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf", - "similarity_id": "d3974b027b3698a009d0c9fad7eb69e174b34f2e530ef08f9025cf0303e21a89", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive2}}].attributes", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf", - "similarity_id": "7b17dea423272ac3111dd9c1defb6a5cb28358653af1b6766c2571474fbf0289", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is undefined or null" - } - ] - }, - { - "query_name": "Hardcoded AWS Access Key", - "query_id": "d7b9d850-3e06-4a75-852f-c46c2e92240b", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance", - "severity": "LOW", - "platform": "Terraform", - "category": "Secret Management", - "description": "Hard-coded AWS access key / secret key exists in EC2 user data", - "description_id": "9e8cbdfb", - "files": [ - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "386eb6c894a751bb4c089aa6904a34450480e1be590711023a2a68ee14da0796", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "module[ec2_instance].user_data", - "search_line": 0, - "search_value": "", - "expected_value": "'user_data' doesn't contain hardcoded access key", - "actual_value": "'user_data' contains hardcoded access key" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "28ca023b3095df8bcdd8113702d7b4e7e6d7565bbcfdf27b4a8b0320b95299c9", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[positive1].user_data", - "search_line": 0, - "search_value": "", - "expected_value": "'user_data' doesn't contain hardcoded access key", - "actual_value": "'user_data' contains hardcoded access key" - } - ] - }, - { - "query_name": "IAM Group Without Users", - "query_id": "fc101ca7-c9dd-4198-a1eb-0fbe92e80044", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_membership#users", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "IAM Group should have at least one user associated", - "description_id": "c5730db9", - "files": [ - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", - "similarity_id": "285761394d82852ad596055c04de19f70aaf315c615e1076931a22a9073a79eb", - "line": 33, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_group[group3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_group[group3] is associated with an aws_iam_group_membership that has at least one user set", - "actual_value": "aws_iam_group[group3] is not associated with an aws_iam_group_membership that has at least one user set" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", - "similarity_id": "805610ace38cf5a2e87c2ef32b969ac655106aa0fbfbad6b1dd257dec660c6ae", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_group[group2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_group[group2] is associated with an aws_iam_group_membership that has at least one user set", - "actual_value": "aws_iam_group[group2] is not associated with an aws_iam_group_membership that has at least one user set" - } - ] - }, - { - "query_name": "IAM Policies Attached To User", - "query_id": "b4378389-a9aa-44ee-91e7-ef183f11079e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment", - "severity": "LOW", - "platform": "Terraform", - "category": "Best Practices", - "description": "IAM policies should be attached only to groups or roles", - "description_id": "32ec58ec", - "files": [ - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf", - "similarity_id": "4619351e06f1202125fc936249bf43cd1ff9f8aa11aa8cf5c2aebbfe70366175", - "line": 16, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf", - "similarity_id": "679e2c76614e5e49869059447940cc5e3165f92a31f48ade26047523c14fda95", - "line": 21, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive1}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", - "similarity_id": "1b1a88ebb0d04ce7b81d092077fc19c5bc8b0adc573cfd58ef281b72f254ad8d", - "line": 16, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "1bf8f2601c8486a9708416092f309ea29a76b7cf51ef881d796ba9c7f1b793bd", - "line": 18, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "6419b72051973e4c00d7d54b48f55c34c1cfca8bf8c75fd495d41b5747f04328", - "line": 18, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive2_3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", - "similarity_id": "6fe36dca7250fca742b2bd26a5cf6d1f181d7718357d641fe1ce1571b0cf3c36", - "line": 14, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive5}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", - "similarity_id": "1448f6502362444803952fac7aa4babd5c2e85d8bb7978861404a2d1f4c3e93e", - "line": 14, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive4}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "d3dc6076fb6b17fbb5ba5f8c0696525805a43326323500b351eb474286337656", - "line": 18, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", - "similarity_id": "52e90dd603b1b654528c98bd55be8a6165eb0db29d1a4160f5741bfbd7ea547e", - "line": 41, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative4}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "b0eec0b0ac66adb9d0af4160872d383af75648d0ef158c475eb861a72bc3d2d4", - "line": 18, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_policy_attachment[{{positive1_3}}].users", - "search_line": 0, - "search_value": "", - "expected_value": "'users' is redundant", - "actual_value": "'users' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", - "similarity_id": "16394178b78c3b4d7fec4930b6a69874934510ee21d280106ef3d21ac31cad5d", - "line": 27, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy_attachment[{{test-attach}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf", - "similarity_id": "cdaf19088a4051d29f0ebc58892b68aa195bd43b1ff5429b60e07eee8fbb3663", - "line": 17, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive2}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", - "similarity_id": "640d8318e35394c2680e0d8a3abda32dc62fc3b523acd771c26346edbe721838", - "line": 14, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf", - "similarity_id": "0027672efbb7f9c72af92fcfdb70fde73a68685dcdf81354b5bb5c30d00004ed", - "line": 21, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative1}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "67dc74aaa73e6f5da59f0d8f445dcfd966fd7c16aa365f4b5af2013497a6baad", - "line": 51, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_policy_attachment[{{test-attach}}].users", - "search_line": 0, - "search_value": "", - "expected_value": "'users' is redundant", - "actual_value": "'users' exists" - } - ] - }, - { - "query_name": "IAM Policy Grants 'AssumeRole' Permission Across All Services", - "query_id": "bcdcbdc6-a350-4855-ae7c-d1e6436f7c97", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "IAM role allows All services or principals to assume it", - "description_id": "948aa2ac", - "files": [ - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "a8586916c33865b58fdc9484bca98bc9f510eb2858b0a32abf2ca2f6f612b89c", - "line": 70, - "issue_type": "IncorrectValue", - "search_key": "aws_iam_role[positive2].assume_role_policy", - "search_line": 0, - "search_value": "", - "expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'", - "actual_value": "'assume_role_policy.Statement.Principal' contains '*'" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "2b9c4a71c4d061182cf960f68ccedd0222857f876febf7fbc615a39d81c230fd", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_iam_role[positive1].assume_role_policy", - "search_line": 0, - "search_value": "", - "expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'", - "actual_value": "'assume_role_policy.Statement.Principal' contains '*'" - } - ] - }, - { - "query_name": "IAM Role Allows All Principals To Assume", - "query_id": "12b7e704-37f0-4d1e-911a-44bf60c48c21", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "IAM role allows all services or principals to assume it", - "description_id": "a54d0d27", - "files": [ - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", - "similarity_id": "c394fc4d53436ed1caef5982a81ff45e0700de56565da09f93f3ab704199195c", - "line": 37, - "issue_type": "IncorrectValue", - "search_key": "aws_iam_role[positive2].assume_role_policy.Principal.AWS", - "search_line": 0, - "search_value": "", - "expected_value": "'assume_role_policy.Statement.Principal.AWS' does not contain ':root'", - "actual_value": "'assume_role_policy.Statement.Principal.AWS' contains ':root'" - } - ] - }, - { - "query_name": "Lambda Functions Without X-Ray Tracing", - "query_id": "8152e0cf-d2f0-47ad-96d5-d003a76eabd1", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function#tracing_config", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "AWS Lambda functions should have TracingConfig enabled. For this, property 'tracing_Config.mode' should have the value 'Active'", - "description_id": "2f90e1e9", - "files": [ - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "90c962f52ea5fed37397420fb45e01ab7d02ee5d6707eb50f951ccbdf1a9e0e9", - "line": 42, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[positive3].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[positive3].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf", - "similarity_id": "221c1316482638700a2f8404f25ec36edf60cf4788960eaffbbd4e2cb6e19619", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[example]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[example].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[example].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", - "similarity_id": "879dd6eaf9117579e428fd7c9764df817b53612e481a9701cac2fef30a866eaa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[negative1].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[negative1].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "f9a59c4f008029eb7cafa5be32b4bcdfce73aa126222b82f5fd1795a638f9570", - "line": 45, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[test_lambda3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[test_lambda3].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[test_lambda3].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf", - "similarity_id": "da77dde7226b2785bb929bd0569096bbf06dfed82552a22db0f0269ed02e4d0a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[positive1].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[positive1].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", - "similarity_id": "e267a4abe1ea25b3bcd73fe6c1032c04a2f98c5396b792ad8df4c83c8a554956", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[negative2].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[negative2].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf", - "similarity_id": "1ae5ef4c9c9b4fbe3a29775913c97c179493c7fa2056cffd7613d6197a888ff4", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[example]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[example].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[example].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "9c97c2999f97ddefa91676d42f4fc80fa0ece58b5d3aad894168e51b3f0676ac", - "line": 28, - "issue_type": "IncorrectValue", - "search_key": "aws_lambda_function[test_lambda2].tracing_config.mode", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'Active'", - "actual_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'PassThrough'" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "c36c67bbf19e43571a3f0c25cd25d8a0d02b75f347310432f0235f9f577dca51", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[my-lambda]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[my-lambda].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[my-lambda].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "4281231e68cfa1f32f1d8548bb255521f0556a0590581b416a20ac4c11449fb4", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[positive2].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[positive2].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", - "similarity_id": "2ccbdaf936a8640323ff8f4571e340c35b10b037a4acecb72967560db09213fe", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[test_lambda]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[test_lambda].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[test_lambda].tracing_config is undefined or null" - } - ] - }, - { - "query_name": "Lambda Permission Misconfigured", - "query_id": "75ec6890-83af-4bf1-9f16-e83726df0bd0", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission", - "severity": "LOW", - "platform": "Terraform", - "category": "Best Practices", - "description": "Lambda permission may be misconfigured if the action field is not filled in by 'lambda:InvokeFunction'", - "description_id": "8fb6f06e", - "files": [ - { - "file_name": "assets/queries/terraform/aws/lambda_permission_misconfigured/test/positive.tf", - "similarity_id": "b8cc9c2cf47dbd3e2763ae84228a73c6e4d8f1b1372d1df2e530bc0ca1a645a0", - "line": 2, - "issue_type": "IncorrectValue", - "search_key": "aws_lambda_permission[positive1].action", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=positive1)", - "actual_value": "aws_lambda_permission[name].action is positive1%!(EXTRA string=lambda:DeleteFunction)" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "7de0da40985af94826cf7e9ac79ceebe2450d6023499fe28ae74f514e2e60955", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "aws_lambda_permission[all].action", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=all)", - "actual_value": "aws_lambda_permission[name].action is all%!(EXTRA string=lambda:*)" - } - ] - }, - { - "query_name": "Missing Cluster Log Types", - "query_id": "66f130d9-b81d-4e8e-9b08-da74b9c891df", - "query_url": "https://www.terraform.io/docs/providers/aws/r/eks_cluster.html", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Amazon EKS control plane logging don't enabled for all log types", - "description_id": "e89d4ffb", - "files": [ - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", - "similarity_id": "29c1c63896bc934cb28fc15f46bd6b5b3e0503472fcc18a0684a51906332225f", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_eks_cluster[positive1].enabled_cluster_log_types", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' has all log types", - "actual_value": "'enabled_cluster_log_types' has missing log types" - } - ] - }, - { - "query_name": "Open Access To Resources Through API", - "query_id": "108aa260-6dab-4a75-ae3f-de917d634840", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_method", - "severity": "LOW", - "platform": "Terraform", - "category": "Insecure Configurations", - "description": "Open access to back-end resources through API", - "description_id": "13e1db34", - "files": [ - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf", - "similarity_id": "b5186c7355c674a759a119eadf0ea62d9e92b31f634d6ecca779fbdaa91e0410", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[positive1].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf", - "similarity_id": "7fc688aee3afc1726301df553ea23582bd273e8d5da9efcc6c0faad15668d10e", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[positive3].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf", - "similarity_id": "a604af7dbec02fc8fe1003ea1b5d40ef5af5f2a992926ff84de55b87cadd3c44", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[positive1].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/negative.tf", - "similarity_id": "e1422fdec41b14fbe25c139e7d3afe1230e677fa2493c7c63885ef292fa8d368", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[negative1].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf", - "similarity_id": "428222b967fd3426fb88fd8b8dffe7bea17c413eb467ace7881de81cc32896c0", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[positive2].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "479900699128eaabffa3c92959cb9f0abca3d57479dd45d55385d3f9fb745274", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[api_gw_method].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - } - ] - }, - { - "query_name": "S3 Bucket Logging Disabled", - "query_id": "f861041c-8c9f-4156-acfc-5e6e524f5884", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "S3 bucket without logging", - "description_id": "fa5c7c72", - "files": [ - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", - "similarity_id": "0915aa52adbb371bb4a7488155e4ef394d35f37ed1c890a4f8f12f1f186c8752", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", - "similarity_id": "cc9bf4dae29fd0f2bc32e10d8d92e1912ee7c4fd592b08539b0336d6d3ed22d6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "08d2f1ba393b422a98ae80ecb6474eb1ac6fee1fa8eb9f19bf4510a9296409bf", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative2.tf", - "similarity_id": "81ac236433d26b714167f13fd591d8a3ad06464d31d765fbd872ef39335c3ee5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf", - "similarity_id": "73d4acf2a493d9205572152fa1ae35fe19df7217bee1c155bdc768f5821142d9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf", - "similarity_id": "72527cd0cae9f92f3bfe3288682e583b00c131e969c03fd54ffc328f1087c5e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf", - "similarity_id": "7d7d60194b30a7ba7c453791434402407a8b6401f1573a70d9fda7ae436f3c41", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", - "similarity_id": "681c66faf22b5e1e1e967afa02622bdafa82545607fe5cf81641b4bc3657549e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", - "similarity_id": "8d0898acec0a1ba12648a3b4d44702f66878f2795166157fd319ca1ca42142aa", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf", - "similarity_id": "c0d8b47c8bd16658a8446cbeb7146fb7ad4320b8d03b79a4c52ad3ab6ed3b7e0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", - "similarity_id": "d94db8aac11974b9d146f092656796518f48ccce376e51f8b9623802921c7a24", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf", - "similarity_id": "1dd387eb9dff7e7dcf6f1d587943420283e10d846cf4c193c79f2b20f4d35593", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", - "similarity_id": "03cee6b520cecf1a644965448af933afc876c602f901b1b3fe5c634ffd3d5b67", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[examplebucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf", - "similarity_id": "6a33cd534b0a399020fec16e495133041119626663561f662edda39679589f7b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", - "similarity_id": "ec018561940182f367feed6138921073f5dac046ba59c870555859e171c83d2a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", - "similarity_id": "8477c4328c2315f099d0ff9e1a0545f9b95393f78c76ad712f7a32e94340093d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", - "similarity_id": "f4c9b343b949dc66ce7458589cc6f5e2462b69bd31ae61a6852fe659270d1114", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "deb195785555f0c7744824380d5fd584f0241f64bd66d3f0ba6b0389ea838714", - "line": 20, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[foo3]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", - "similarity_id": "6aa4bc5549c7e8abc450cf57da0b34bdcae87d5167bda63cb64618b6454e36d2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf", - "similarity_id": "15c731818a0518c1cbd40cfd9a081f21672f9df569b04f43b6ac5f3ce21c184a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", - "similarity_id": "fe333664110b55936296c58e8f0dd89292300a89cf18a5e08927ee4b6f652876", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf", - "similarity_id": "f88320680c17805355e0ba4d193f0799d9500db8965342087ea0663b38ae0b89", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", - "similarity_id": "1ed6def5a4f456db5c42e770f725f9167ca4512256e86d7bfafbdb2e6bbf28fc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[examplebucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf", - "similarity_id": "0f45afc602dc017e4d3d51b3e3d457c3ba3d14df77dadd4f14d41d02b483af89", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", - "similarity_id": "a1787bcb105b7d684f4d275c74708a5f4bcfc9172025de79c7832df2feae319e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", - "similarity_id": "70095ecc46abad3919fe45647a7ef9dbe372e3be0b578ab590add42a1319e82e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf", - "similarity_id": "9d4be52e420a24181dfb42916f1f7ddaeb7bf4fc86c942aa081684ff48fa416c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf", - "similarity_id": "8065e73c191fe04b214bcee64205162309d146debceafb9c6f1f2fd205cc4708", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf", - "similarity_id": "41de94e33d79f2f5ceb94789cb2266dc502f6237b08814d3dc1fa641bcc1a9da", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf", - "similarity_id": "3ab80c87b6a52b8f6ea28304a0aa5e66e7fff00b3f68ab2525ded6bc96be0f1f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", - "similarity_id": "39aaecdf77977a57260bab5f6eb8e175a8835477dc7d6802456ac8153c2295b1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "260607d6f88cba8d3758db9d6c48ed9c9f77675557a600e78751f1a506606795", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", - "similarity_id": "b9c22b6443fb1c72003d54b42ce03b29ab342831be3c8fef591e2069a49bc9b5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[hoge]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf", - "similarity_id": "1ca1a3389568cd4a212e00b24d6815592d41128a893f4a981c71e409b1138fc1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf", - "similarity_id": "3b86147e87ac88cd34567124e616ab4272f1aee209abf5dbfbb559d542a1c389", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", - "similarity_id": "d9df5ecb82ba61b3b1f4d11c2a835f8a6d6ec6f2abf72553094a643f9d1c1d96", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf", - "similarity_id": "b902ca93d0dd65dec9401d421fc8551ce95b9e01fe376fd1c63dc289b49964ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "0315960ed11da1920ddcd1c88590284897e8960428dc3f9029fb54c8682a64fa", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[public-bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "ea12bb651a66eb7ef1ef19e1cf74888cf9939eafda0595c20c38733554cb4d6a", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf", - "similarity_id": "634cb860e1eb17b6b2ea7823138f533ed1de06e73a6f8211630b60dc993dbc2b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf", - "similarity_id": "ab2c99c73f0517c204ef944863cfc24a334d7decae6a278c026c88c452a4ae9c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf", - "similarity_id": "2573b12ac2dbdf6ea55ea97db3082db15a486d7874205d3155562eb5a7ce0605", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf", - "similarity_id": "a3a0615a6c74c17c71e86faab892abae8abe4f564142ad45743549e62ebc95cf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf", - "similarity_id": "3988d7d4b1e7c3f11f8982e6710721bf80fdadc5b3935de4dfa569440fee00c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", - "similarity_id": "9aa262582ff7169dd37bf14666416bfcade926adf997a9cb66c6f4a0b3b215f1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf", - "similarity_id": "dbd6f9d2ef166a294a9716425ae89bd7dddccf9dffeaa1da594f949bb8664364", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "7d7b7fdd970ce0417c7e568ba68c96e67b301cf998d8da975cee54d95e3fc0f5", - "line": 69, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", - "similarity_id": "01ebbbc0814026249abe28d344f7c9685a2cfdc3f7da904b04ac5e81a331e3ee", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", - "similarity_id": "b75cb331e1a12cb3c57313e105d1fa3f18fd95336be85b1461eca2ed3c6ee7fa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", - "similarity_id": "d7807cdc2179397472f3afc58aae2b649abc46bc9dfc91f467d4565b86b4d6e7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "6df8fa568d393e4afaa9ef9f0c68db065e79edd30269354a4aead732b78351e5", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", - "similarity_id": "daabe0b8ab0b25989d23980f116645dd15ffadafd6b2dc87f3425040fb3a765f", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "54bb5a2e86fb1ef979a54344d1cf84af0d3b3d2db5333e2c93b8558c353b56e0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", - "similarity_id": "d4ebc6b252560b21b287c3cf9dca6241be0c4212d96c66d3de450ea9d5cfc32b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", - "similarity_id": "c9797a7a687eb64048e7a67e177250875cafd9d8f20ddbc2ec911cd4997b1e47", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "ac31511dfa5fcd27c24e6785143f4b997d3f83d0f29c58c4ebf6f2d112722f39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", - "similarity_id": "9afe4fd52fb3e57d863b9c43c4a4053017a8f750cb7cf082d48adf1dbbae8f6b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf", - "similarity_id": "023e1312fa46619b8e401bb8088657f70ae7eecefad946566e4b8e3131c9f649", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf", - "similarity_id": "6ae7fe45f53495b56d1bbf45cb61f185bac67a03754f0d69115f9590a86449a0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", - "similarity_id": "39a30aa9b09b75a2ecbc508760f6e68d2f1757a70463a061137ded98c0520842", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", - "similarity_id": "8eb933ca43156e90261b896b7b181596e56a174b61d7c73af3c785f2f91cb298", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "8e16d8e4c29e049641699297906e71b844137a471c31f72d5bf8ccd0ad39f936", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[public-bucket2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", - "similarity_id": "0dc544083130ec1fcaa0db8fc0ff334ee442e1b65fb7258ccb5524d2e344cb19", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf", - "similarity_id": "4e636d1f97e1f2cfa3c0db39a86ab833e2048cb602cfbeed5e69db546ec480a6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf", - "similarity_id": "b6bd290c669cc5a290e14a6f8b13e94c800b12fdc5f6c8b274be7b20cd820d43", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "9dd31e0d0c17a9a1f42e674d7a6266d0f295a080ae9db3d008c7082a7373b7e1", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", - "similarity_id": "6b7e683a6c4ad57226d6cccc8a3a3567cda15bee638dfd9ec532f55416de9a32", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "4fcfb8b719aa40a89a931533f00d6c1ea7e4c9b56eb2f4db31ccc1e25f68cf85", - "line": 19, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", - "similarity_id": "7d1fc5e13ce4debd7e306fd9fd67af6f8f9f1b6d59141b6ac4bc8f2aa77a9c0a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", - "similarity_id": "e3c2491f7b9e0558bb0dfa1766243416afcab98ab4414eeba9294ac7dcbd5a5c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf", - "similarity_id": "37d1f089b978b8f000c435d2c195ec194ff7d1e9e7b9b918a2088dffc0684de3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", - "similarity_id": "ebe16727aad9266db3881f15d4683c3b9459db73ec614e6522c4a339c6fb092b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf", - "similarity_id": "00bafa01ec47e3a3437979f8b1ee6533d0b82b65bade3a2c5d08fea5954acbc3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf", - "similarity_id": "dce28f927cade1cd6db83ea98553e0cd9b206eaffd6dbe2691c32ed5b2f0e189", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf", - "similarity_id": "03c6bca4573b6e5586d17b38878736a0d6bf7dd4f7fe15f1e6636c2eb9b7f8a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf", - "similarity_id": "4c100307872c0e696614334030b726cbcc9e07007b32adb684669ee2c8e6e4d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf", - "similarity_id": "067cbba611660ee39e3093b4de55bb6630a896f84eaed9e1bbd39f08c1a15470", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "f56a895cb2703452e851707aa1ccbff17f64973332310afebeca0fa063435156", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[log_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", - "similarity_id": "56321e63cf9bf7e585aa5b32cf746a9a472182a42179f5b6b44a7168a572eff4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf", - "similarity_id": "1eef054ca8c0cf3fb61e3f544cf8969bac8ec118b1e1afc953ac295797341989", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf", - "similarity_id": "b2be7114050039888ec68b11df402591620cb364530d1469ab8ea385dfe3cd98", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf", - "similarity_id": "d0e495aa3e76a7f477c0a16fdbb23d9529908c14b369d9b4008be62691f0445f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf", - "similarity_id": "e46490a206cfeb7922bdcb6de0cefd97494201d0b0b7a502a610951ca64b08d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf", - "similarity_id": "acdf13f0aba1f64a6ec3cd2c5d0fccea45bf730ba0644c3791ac486144b5d9c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", - "similarity_id": "bb0a883ebd72676d1d7eeff73de387ebbd2ea56e41ec1e9e1dc8fad88fab7d34", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf", - "similarity_id": "96a715108c28aa063a3696d9d7187b18203b780a99306c68943a67e88000dcd7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf", - "similarity_id": "17ab3cebb90e1ac64eea3309d43af7759795bdb7060e7d923bdf714b12d8a1d8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", - "similarity_id": "61150f3e4862e130dc7225977347f17fafbc02f909c47585010fd36073e56f4a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf", - "similarity_id": "4d142c7a002de3bccdbd4da870de9247d5b64df77923b7c77e3fcd22dbf2e164", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", - "similarity_id": "330d36cefe4844ed71344daabb7dcc6706ba82c35eb00fea6455445352609767", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf", - "similarity_id": "51f3df7d783896f1cf3b10f737d51a336a0ff74579aacceaf3556661e1168620", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf", - "similarity_id": "0adb6b9837255be0951c00d3718d8d7846144ff58a9467ff49600f8b01ee4711", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", - "similarity_id": "0bf0e1e971097873aae8479f04d743c4ba60023a97252e07a71d4012c187bec6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf", - "similarity_id": "1449495796406077b9f7f690f44a390a6e6a2d6bca2fb0d53761d4b0d58830c8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf", - "similarity_id": "e094d4e7d171f8a25830bbf4f7b3a95b6e337408d8ce41eb39ac9393d28769ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", - "similarity_id": "966c610ebfd12af0d920d1b8b166631b63efd91220d0d3fb96823f87f01c1b2a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf", - "similarity_id": "b04a5521901963ceeb3e93a2ffad00547327f2a0e1b822b7414263f7e30a31c6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", - "similarity_id": "e272197b04b7353b2be59f77993911d206294ffbc1420751b9bed03c130e53d2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "06c253e54a7686d7d133993da0083c138e9278b226dde197bade410a3f53c0eb", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf", - "similarity_id": "742b12b99176590a7589937d6ef5c5472e1aec9e5ec957a85b3de0bd12b72fc8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", - "similarity_id": "3c4fa30a384038c4cad1c1b9376fa405b809672d9197a5b5ccb25f8e847990a2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf", - "similarity_id": "743b530244ca7c8a84ac4edf504ac3ddbb12ab46ad4c8ac07538a22960b80da8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf", - "similarity_id": "3cf673c5a977f281054d6d4156be0e7596da5f884d4f0e395276c8e7b90d9ab2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", - "similarity_id": "b5e83aa4afb5444142b4f791cdc2bf09d76595e2731815e1b6aef6519fa4b7b5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf", - "similarity_id": "ed137e59345e2b22f2e276ce551e52704fc4bd48cd3659533ebfe9d869054941", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "50c0f28599265a6084545cf5ecdb8a168a759c9bc1d1416a171767eeb0fd8de2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf", - "similarity_id": "fe6705cd4526a5ef249287c724128ba030604f3e06dc2a98fb29e2830ddb97e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", - "similarity_id": "aea43cd2159af3ccc0a42473849b9253a35889663cd42c48ed64ba235e9e457a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf", - "similarity_id": "7ce19aff3cccb4db66e6bf98e01f3907da2ea7cdee5a39fd031a9e91aab33ca6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf", - "similarity_id": "6542f539810975fd03fce457f6c126b121bc275fe28708e6015436cecf39d9d9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf", - "similarity_id": "c217babd1d0774280821f86c9a119648c254964ebd695e122c9d24193ab93348", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf", - "similarity_id": "18f347bba0943b04a2e48e68db2da150081d0ccc8416735f3887f1ae976b48e6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", - "similarity_id": "7092ea9109a6c514ed12b6a4dcd850fb2fc453a495e7f36f7a2b3a1e78af98b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf", - "similarity_id": "e6121dd5493655a20f002518e02c3e55f3eb943250e7245b0e252a9a77a508d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", - "similarity_id": "941c933f29b056495bb058522503c56a5632faab1df651c74ce5cdd153808087", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", - "similarity_id": "42beaffbf742cd3f21e9efa2585aa345621a52a8a25b4b190e2b6f2a4875d8c5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[hoge]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "be9044d72e3bdf08621a66a937a4986f6c27abbc00f0f153241cd00731a2fd49", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf", - "similarity_id": "e41aa28a2426f4eafb157734d27c9df647e58fc424bab89506e77e9be3cbcc93", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", - "similarity_id": "d6894906f876bc3344b4f5a3dff58286f2532322be0234814ed4124f556a2a0d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf", - "similarity_id": "15108fc8dd8d99782c479ec16bac84ccc0297ed32cd61e66891151cb974a9092", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf", - "similarity_id": "ef3e4154565720db79a1b6164fea48d1de681f7078cd5da14e617d4be2b2ba38", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf", - "similarity_id": "26278fba0f567aa336d0ef2bfee84346f1e43b5b037575d888829a85cf62ea88", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - } - ] - }, - { - "query_name": "S3 Bucket Public ACL Overridden By Public Access Block", - "query_id": "bf878b1a-7418-4de3-b13c-3a86cf894920", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block#bucket", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "S3 bucket public access is overridden by S3 bucket Public Access Block when the following attributes are set to true - 'block_public_acls', 'block_public_policy', 'ignore_public_acls', and 'restrict_public_buckets'", - "description_id": "aa9967ef", - "files": [ - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf", - "similarity_id": "70c4308ef7d7d89ef019a60b350e28a0cf7c43e4faf5a891bfa62c5dee98f721", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "module[s3_bucket].acl", - "search_line": 0, - "search_value": "", - "expected_value": "S3 Bucket public ACL is not overridden by public access block", - "actual_value": "S3 Bucket public ACL is overridden by public access block" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "63e90b0b56709120009dab93e51095797b39bce1092455cd41fcf56e10db417e", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket[public-bucket].acl", - "search_line": 0, - "search_value": "", - "expected_value": "S3 Bucket public ACL is not overridden by S3 bucket Public Access Block", - "actual_value": "S3 Bucket public ACL is overridden by S3 bucket Public Access Block" - } - ] - }, - { - "query_name": "S3 Bucket Without Ignore Public ACL", - "query_id": "4fa66806-0dd9-4f8d-9480-3174d39c7c91", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block", - "severity": "LOW", - "platform": "Terraform", - "category": "Insecure Configurations", - "description": "S3 bucket without ignore public ACL", - "description_id": "28aa7150", - "files": [ - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf", - "similarity_id": "46421a142917c62555a69bd425075d2431dc40f63b57eaed61de4282be4e9758", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "9b3730e745dc2f4baedc0855136a9ac80ad27367d6982c79646e1360bd3ef900", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf", - "similarity_id": "ab2e0b6739193c438e2bec7cfb8295e3ddc27e60ddca4e60dbbf9ac10a375837", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", - "similarity_id": "bbb6913a9203d9970df63e616286f66d320ef7b21afd69dbf55c54cb058c4df3", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf", - "similarity_id": "09d8ef7cbf80f91167e216be04a4354c46d652cc67b81ace9bc2869a692242c0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf", - "similarity_id": "3824f67d6190058404e60d9067d8524a7095f909383225db6476cba83d06f12a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf", - "similarity_id": "9174f3924a58fb4a5e0e51cf61a8a7e1accd1ead1097aa46f22b8d1b2bf72684", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf", - "similarity_id": "13c92f771db0b436736f34566562ab99b565d1e3fb37c16828c2355c1664a845", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf", - "similarity_id": "d1be204edb752c652abada7bb3bf5a891cd2f73d46bdf04b7514a466bef544ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf", - "similarity_id": "82166a5963fef238452e22e78ccbecf9f44dcfc8cb365d168c9a386c673df9ee", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf", - "similarity_id": "794e073f1b34dc13bfcff4a33fbc7ddbde933949bde0a8d263c07ad605742c3f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", - "similarity_id": "4062d0be8cd3e56430b79319928ee478dff050ece61e0917128e0786e578a842", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", - "similarity_id": "7106bfbd12b4ac15bbab4f3e09a6bbeb47f9c24c80f8c091c5acd822f35c1e74", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf", - "similarity_id": "c7a17f5acc8732f5d2692e3976d9bbec22c92166499b29fb4f1427b1c9c3fc6c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf", - "similarity_id": "60feebd225a2e753aedf60fa974036449c7c82a1ed00d670e5a6762b2a555358", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf", - "similarity_id": "ad20c8b8f6408498969d99b0901c9163cf047cf5c9fe8519a6dd87aa9401ed57", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf", - "similarity_id": "8310782747aa887c900fed4e72b880cd75596ff225156d2cacc2d237ec50f386", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf", - "similarity_id": "58eb8cc22bc7220f84cb1c98bc138f2f15a8756753b41591f37bda9c9e9b0b6b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf", - "similarity_id": "95e3596c6feb4929ca5c1e770bc352cb378a6b4ef8f8b970f1c9c7baa6da4960", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf", - "similarity_id": "ee4c600881beb53931b0bcc4dc9081b082c25db3c913c9d8f02f17c2d35403b1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf", - "similarity_id": "868ca309ac1af951565c615b30f5cac4ce0590914362962e9296c8456cd00197", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf", - "similarity_id": "55584d5e8a2c97650335e12d11ebf447fd1be8adc3131c376c0332f9f6dd0264", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf", - "similarity_id": "f2c4d02711c31d8064e8541b8d3c0cb497028ed9350d68ce9c5f4571ca9889ea", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf", - "similarity_id": "7e379ce70be7be1e2cbd2535423f228298d35d5bd4af08895ac1407ead5ee67f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf", - "similarity_id": "da28b27e0b7d31f2cb89e87424f70bf3ca3400a98eebe923ab5218f16d4f62ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf", - "similarity_id": "969d115e069f3f3d8145b70c18b6aff6cc3106df6d0b54f1fbeee95fa9a73b26", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative2.tf", - "similarity_id": "5f0d481638563d43ec8e0c780389a129fff129f5e26da6cc5db65822ca32f4e2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf", - "similarity_id": "3219ae66520350c5f684706fcee073780c38002c544c741cd7fc2649f4623546", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "module[s3_bucket].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "7915d61527e35dc8c02b27663bf0c4fabbbf951e906c955538a1b0c5145f21c3", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf", - "similarity_id": "5ff8e3d899ad48e8d9b12f045e457008c6a09c77d588d771483bf9a72a1fb3ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "a6a39dffa872be079622c039e04e4399055074f295f5115d6131860aabcf210d", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf", - "similarity_id": "67a9b1e5e52cd2bdd4ad70c8e4add2038d9b687e32b874fb2b71fe5e919ca4c8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", - "similarity_id": "b0be2bb527fa9103cf66ef9e13af23feb65108f02ca4c3e382f54e36278fe67e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf", - "similarity_id": "dca212d4ca54b5f4e97e4596c5f1757644c374a302427e599af8d8a4d4b0f62a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf", - "similarity_id": "24bed4e79074a0732a976b6867b5a40c6546724e2c8ab94d030e14f905610389", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf", - "similarity_id": "93c1e82d98d27ee2b2a3f31855d00d9a2e6a6e581306e8ef0780d8d4649bcbce", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf", - "similarity_id": "a986fdaeb3dcfa6846a75b3c23c7e67f33af01504ea398ffbd9a7ff0937f0228", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf", - "similarity_id": "af2a1e63a149db3a47500c6fc17e68bf8177fc49650e64ae55b9f01c7abf88da", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", - "similarity_id": "44e9de13fc33ead4f07ec60f220945bf3bcd413fd02bfd6888cec57abe58f37a", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf", - "similarity_id": "2d0e65ee6668f306d2b249ac87480b41e7053e68ef8c8030bb4ef629819ba5bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf", - "similarity_id": "f471149c7d3ba246caf92f1d9195ebbedf8c6cba384331a458bc76b95c0fa3aa", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module[s3_bucket].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf", - "similarity_id": "cb92fd01a9cd35a3b9871353a86e970ce81c493ca870e685ec73ecd2faa21833", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "e1aac6701373e656b46089f104a5419d540040231f98ab0d750b6c9f072c9325", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf", - "similarity_id": "4a3841fa0661203dfcb2d1cd254a9aea76f714695c44906f6907452f4f45c471", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf", - "similarity_id": "d458ca77a0c782aa5495c09c6dcffbe5a51522dc6e8ec1d9425077025d4fbc7d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf", - "similarity_id": "4491a578e416b4b72ce8d82ce8baa604d2633066aa2bcbe4067f72cb8115ca46", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf", - "similarity_id": "e5186d764509a91f4ccfb9b0913f0fc03345eae7bb18e8b9a45ebe36011c0da1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf", - "similarity_id": "954025b9ea01b3d8ad931ff920a1f73f15ad3991aa150eb8f226709e4d96e0ef", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf", - "similarity_id": "04d55ee345e43ceab854131a8805981009efa627ccb4192b0e0160a68b4c3d95", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "deeff4aa803636a318fda9ade59e079b385cd016936fbb3a84a7238c7df82fdc", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf", - "similarity_id": "d86c04f2694d542fcced31feeb3dd8b71adf2af7af7bf9fd1187c7d4114f7909", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf", - "similarity_id": "fd19f0ed6d25e208608a32ec7b9f1d6cbe755a79dd68a69402b3139436833e6b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "0d4d10d2c9b1631c2ca6ae5b7ab45b7bd93d55d640cc9d2fe881831e3f4ac704", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf", - "similarity_id": "00ca0ad0f80858a9ce1ab151d3017bbb96bde0b23398af857cab5ea4619314c1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf", - "similarity_id": "a143e24e718793a6d30b701ee30d0565e121b76ec6b809ce2b583b274747984b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf", - "similarity_id": "02257d32562ca2c3cd49816be4ea43e120b3e8c0e7cf49ed49830e622581efff", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf", - "similarity_id": "872ea1aecbf4506f275290b372bf0766832dfb09cfac56fa92ab7a62ad58253a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf", - "similarity_id": "606055c45c823870617251e820a02bff2fb6ba107fec0fc102a01d18cd8b782d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf", - "similarity_id": "d1cd614971c2b066cd8459ee0fcaf457ec703e1102301743a0e67045e9a35e84", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "b033cb9f3871079f45dad2fa67a95c1b430a81c31954e934685a5c62ef616c82", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[block_public_bucket_32].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf", - "similarity_id": "2f92339539f4383b59efb26b0987b4d8a98d67e6876bacd5ea73f95a0a625bc8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf", - "similarity_id": "9b9f3ac357876ef050cd9fb45dd51de920f907417871ac7ddd0f811acfe7fdea", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative2.tf", - "similarity_id": "9603310a73bc8985fc6ed42b81aea4af36b5e5754731d2b8ea7d62d660df2104", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf", - "similarity_id": "8453bb65582e3eff5468433f889fae03e0e6f864321f5c31dc2a134975cb7aa8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf", - "similarity_id": "23022d71ac08b9b9136a5fc1934be199ca47267ea5cf57f7765568d83bd0c239", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf", - "similarity_id": "fbda4c542c849c120c0509bf0b1a2ded8b21314642c6ffc12e706a208c1ad7c9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf", - "similarity_id": "8538a926a7315f20bd3564b8f86bbb46c1dd3373ded43aeb6ab7c6dd62b06b74", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", - "similarity_id": "c53add7236bc0318b9e19672762b2b207608ff85a6c0b190a5759770ba4cb617", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "aba30c7598affff9a1359c4f720505eab9a84724f9ca16126b72c5db08df3e9f", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf", - "similarity_id": "552013651b2f48918d034ead4caebb9360d5563a002861d8bc1390c19753c692", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf", - "similarity_id": "9cb27d9f6150cceb8b56eaeefaa9688cd2dfeb4adc9f6572b691b5ee726128c4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf", - "similarity_id": "7681d963b30a63959ab466ddae0ad90fc4b1340b5d1ae8f24a801fff9321eea8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf", - "similarity_id": "9a0b8e18b53794db1e2ce776a22ed89904f84b1daa080e83c9fb93059e6329b8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf", - "similarity_id": "75e30c83f46a2ac3a6830125984deb7ce8608dee361a6ebc8d078ba95d5c5608", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - } - ] - }, - { - "query_name": "DynamoDB Table Point In Time Recovery Disabled", - "query_id": "741f1291-47ac-4a85-a07b-3d32a9d6bd3e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/dynamodb_table#point_in_time_recovery", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "It's considered a best practice to have point in time recovery enabled for DynamoDB Table", - "description_id": "205ac3d1", - "files": [ - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", - "similarity_id": "f03c038717719d4e52fd0afe624a281d49dfa0075398a0587e3cb73c1006b47c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", - "similarity_id": "74c6bd6c5318eaef60b3105fe86a3d0d2d9aacc51dec5e05b090058ba4634947", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}].point_in_time_recovery.enabled", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to true", - "actual_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf", - "similarity_id": "4d97910308cd6eea33fff5ebacfb96f384f273fdfaff8b3e520515e8e9883dec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", - "similarity_id": "e3ab84533625c6e58bcb96022c917347f39b52c0f0fe9fa1fe99e2fdf060f6e1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "845e0a2e82bc081983abd1ba64f65189f082447269a33753e9124a4359bba0c2", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "9d2737d2fb94bd186b96d28ebbe31e1eaadada3416977f7a4619401f44d4aeeb", - "line": 90, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", - "similarity_id": "2a606270f6c7bb7bf9298977e2f8c7f0f98d60cf7d258bff85b7512b5d49681e", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - } - ] - }, - { - "query_name": "EC2 Instance Monitoring Disabled", - "query_id": "23b70e32-032e-4fa6-ba5c-82f56b9980e6", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#monitoring", - "severity": "INFO", - "platform": "Terraform", - "category": "Observability", - "description": "EC2 Instance should have detailed monitoring enabled. With detailed monitoring enabled data is available in 1-minute periods", - "description_id": "0d5413e6", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "fb5e9e5c2d43d59b4d37d1c7f3f3f4a803d3bda9788dfdf522779036b06b30fb", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "01cb77186b543a354c34c5be8478f882788a57bb95516cebf48843815ac63920", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive6}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive6)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive6)" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "4e462c3427439c8cb969d1c0a4d05d37a8f77b22786044f14a3422dc5495c2eb", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{test-ec2-instance}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test-ec2-instance)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test-ec2-instance)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "616bc60d4322649c538dedd947befa0c9a64a29c15dc042d668c7ca738a258fd", - "line": 109, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst32}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst32)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst32)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "9645f50b3de117e8a021b8709a8b8bb5f7a9cd2d8c41fc606e852fd79c0e5a4c", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive4}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive4)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive4)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "85fcaacd9ef9041b5c6fb1f673033173a758ca10d4b9193897cf41cf75d4155b", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive5}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive5)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive5)" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "a2c506b7b224cce01b5d2281aaaffaedc631bd21a722c4727f46de453670002f", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{priv_ins2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "e4cbafb8a7d4d5062d2665acff7c953c35b9820b9e9bc08684f70b3751aae297", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive7}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive7)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive7)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "e9b1164c5be2c1bf401b14051485e55e49b181416e8ac0d493eb3e19ce56d420", - "line": 57, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{negative1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "8e00104660bd173409b4276a534d79ef5defa26b8b193ba68d97a7c078ddf365", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive9}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive9)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive9)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "ff5d6b09922dfb8272d0ba8070a81a64a4775b6b1b8ff8515d58a29f0556508a", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive8}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive8)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive8)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "371b01927a7c7096c6fec4d1e4ca5580773680aec38310a45655f107088c22da", - "line": 96, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst22}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst22)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst22)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "bfb398b836f9c8600b4aba985efb752c9a8cfaa3f3a74f0e7f7cf6652ea6d433", - "line": 82, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "363534b3aca3623853f868a73d58fab0a88d49cfcaad45ae34a4988799fa918a", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", - "similarity_id": "2cb5de106e6e7d8de2d0bbcf3b610c6ffb449ab807bfccf776089e4aa70f67cf", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{monitoring_positive1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=monitoring_positive1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=monitoring_positive1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "69aa775d5948502a6e89d2e7c9ecb1e08c0fd427cbebfb9bc34f2a83075ad179", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", - "similarity_id": "6efb19f6ecf1966b5372ba125a5dd2536888e227c78503e5a06392132e0e4b63", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "62c7ec970e2906db2b7e4848c712f7b2153b68aa6835490eaa43e2e8084efb24", - "line": 88, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{test2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", - "similarity_id": "65d2089f6e5028e4590a61cb2829b75bd4f007475504600dcf33f48fab2e6f24", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "75893af01a4db33ecd80f9136e8e5664b24f93abe3500d0575bf1935bb104283", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst3}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst3)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst3)" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "be5ffc7f628fbea762728309f0046f2603fe71649c76ca81adb0e0891fd0cfdd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{negative1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "de72601496ae4e0a186d3d900b993fe11bea39d55051c5de3106ca74d100edac", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{pub_ins}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", - "similarity_id": "f4efba1f428b8ff2789680233bc04f2b9238332c3ecff635db7b45039e9f29f0", - "line": 20, - "issue_type": "IncorrectValue", - "search_key": "aws_instance.{{monitoring_positive2}}.monitoring", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is set to true%!(EXTRA string=monitoring_positive2)", - "actual_value": "'monitoring' is set to false%!(EXTRA string=monitoring_positive2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "a4641650983d227d10d35a52e68db1e4d38aeda4f55420c3922c2474c6d81c88", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web3}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web3)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web3)" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "8689c4dfb4cd75e31855e08033351624d05028a3409207b746b852ff99c9a1d8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", - "similarity_id": "278d8af92a08362a9091a6dd4006e2b4c5776c879f2e0d79c7e0ee108a653a90", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "afc6976b05a7555c8f78892fa6264cd47b011e4790050a785180923e887180dd", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "e604a1bb76c27d5c6b344de7d63eb8efca137069f5b01cf0ee9b751ad6a6cf07", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive3}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive3)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive3)" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", - "similarity_id": "0c99cc2bfb0a7247589473e66b04eb2b339484b698f3b4fc52ea3bf6c6653c25", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", - "similarity_id": "06ef5f50950fa554ab73735387a4725286824175219e4ff2c9246fcb9d0565ce", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "module[ec2_instance].monitoring", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is set to true%!(EXTRA string=ec2_instance)", - "actual_value": "'monitoring' is set to false%!(EXTRA string=ec2_instance)" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", - "similarity_id": "c6109be8837868af7f05ddeabae7803c95e36ee62c26f58c305358924b3717a0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{negative1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "4e17df5fd2e1d30e13a180e8e6b81406c0a77337e80e6114e14ef941d9e4ae72", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{pub_ins2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins2)" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "6073e20678715b407134307b01ffee4b23e76a7face8e0b438ec12f5863bc0cc", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{priv_ins}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "52badb86aae36a8c0263149507e1c0d32e8aa6d9f02992368feadabaa4b38c60", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst12}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst12)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst12)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", - "similarity_id": "2514498a7e100d6f2aabacaa8cc4e1f0a7f2d59474e9cef8fb7d6affa5db3ccb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=ec2_instance)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=ec2_instance)" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "ede19bc1eb6ce8d021480f5880a66abb6bebceecf8503d927fd447d80b088c9c", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{test}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", - "similarity_id": "72f91854c0268009c83b8c6af178e60a53876d296d3934e218cbfd20d2cd9020", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" - } - ] - }, - { - "query_name": "EC2 Not EBS Optimized", - "query_id": "60224630-175a-472a-9e23-133827040766", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#ebs_optimized", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "It's considered a best practice for an EC2 instance to use an EBS optimized instance. This provides the best performance for your EBS volumes by minimizing contention between Amazon EBS I/O and other traffic from your instance", - "description_id": "ddce4bd9", - "files": [ - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "c4a06491dcea6102f5b74457b7bfb9b08a4d990808e9d3f8f85e35f51d959034", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_private_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "011dc8503dd732837ed7d4ee7617776ebbd3ed9cd7a4961a9b6837dcc91ed32d", - "line": 88, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "fbfb5c9607a895486d7c821ea64facc86d336e6f945f2bb0eb4082125b2cfe0f", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "bc2f8f6fd18b3a94d87dca6b5435da921868a70fcd114cf5714b9fc040f60ca0", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", - "similarity_id": "e52fc171c7e5ecb99bfa9c987476c634721c0c718ce5baa8fb0efc14a24c9ca1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", - "similarity_id": "66354a1ecf30be3623f54604f8262119588fc6c2d0e91cd305b25f5e12b9e0fe", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", - "similarity_id": "f8e171f90476547c9b64dfd758378f6ea6616d3dd39e015894d953388fab5ac8", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module[ec2_instance].ebs_optimized", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "16d171e432e242727969a74f50061fe611a3b00051e34a59685f73375ebc3f7f", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{pub_ins}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", - "similarity_id": "ff87c287f6db10b6bd2f71b217955419f52b8a20e0417219261a4437c409179a", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", - "similarity_id": "f7ccbb59bf0f8058b705b7c57d75ec788c42e9b9b30f63ecacfaa040490f67cc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "e9f59f9b1a23cbeb6c3a9b7238ff643c0ac4a328a92c2a842b6ea86a804f6ae2", - "line": 82, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "c220efbf0e25f49130e1d9fce452ae28a1ad5ce3c057b49b1547cd744ef8e566", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", - "similarity_id": "a3ee63f10b14882d13199e67e085c72e201a3741499093466d299350e34b83c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "23aea01abc940cecc8ce168c79eed044822f080a60dcd3aac076a7803a9e4cf3", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "af14fc5e97bd84336c325b1bbd3a5509d822f055e6a3566823f95b0af959fbae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "f82a92f2fb8c79b56afe9e01c57ce2a7bea1d2572a8687d81f4040c53263d346", - "line": 109, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst32}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "3e5e65f8454f0431e7a877de325048184b8d6862c580f04bdf18163d797c2c18", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{priv_ins}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", - "similarity_id": "b3eaddee1331cd85e414f05354bf6e94a8df2b615af11495a180cae282158d1e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", - "similarity_id": "8344b4229d994394d98de0a6cc664f50ba2b524395f29216245e88f1cc2f2abe", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "789764d470c6b4357f6a5f2ec52a2019060e8c08112c198e47ba46ca6f3c8c20", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive7}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "8a6b04dfd2de8f1cc74c02fd4c8503c8b901118f4703b78a11a6270aa29c86c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", - "similarity_id": "98d959307541f8d003537375269d0e23a97520f7c2f3613dfb999aed3d26ddfa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "ffa0acbfe39ec7c5c7d37d2c21442e7ac8721cafcdd13687a919926978f8df9d", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "7445785a11415e487ac2e63d28ad27f04713d50bf9db8fb4fc0dc7d20978fd38", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst12}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "8acfb066efe90d2d3280c25ac5b00f8471f492930b54426362e5d290add9f32f", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive9}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "68aa819938a47ae9d655e54c504dbce54600ed5abfa51912d143fbe41348f238", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_public_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "4036bb57a8562699f2bc3e95855700f58ea64527e4d082e53e0ccef0b8f6092b", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_public_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "35a685e9c6c76e75f7617205e6f27563a882e47484c97f65d3e1731097802f84", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{pub_ins2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", - "similarity_id": "b4c6c88e31b4ce9ab062a79bebac8f35502ee7578c9ed8db5bf52e99b946a242", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "beb9d2f657e725c12fb24c822d85dd0e215a83050e104683ac4709a2318531ef", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "c161e1efdd486d50ba5b75cf87d60d91e112c5f17c7c7f956567b70cfe4119bb", - "line": 57, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", - "similarity_id": "985f79588fec3d23db5a958f5002f29d86bfc1d8983b5749504578e9197516ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "67e5ddad789bd369b3dc34e97a0372e9665d4392f17bd9ea7f9cd5dd0e35ca26", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", - "similarity_id": "a81e2e8fe09364e404326b15c57a8f9b5a11bd3ca5dd416fa39525ee1bc219b6", - "line": 20, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[{{web}}].ebs_optimized", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", - "similarity_id": "d35cf5365ac696e1262568fb49a93ccae647e2b34abfc9f578b624abe9cfa7e7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", - "similarity_id": "b087cb883ee2e13b010a776ee3f3f5a06ad211d7f468ad010bd7882957fd8d3f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", - "similarity_id": "90b3da8eeaec7e202feea0b5f07ae04b35ee077f247d838fdd09e0ca7959092d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", - "similarity_id": "b6325c56b8eef5cfb7790051ff9325e986238222df9016138531c485941a811a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "2b38d84be01cb50de9f772e44c02fac3946ff43a0e6ce3c4254f443af8c8e256", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", - "similarity_id": "bbed9a3bac228c8202504c9ffd9c33d80fec44bd5cbd3d63e643bc32263fd357", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "ed81e1904a44154caffa2c6e722db22f6b49de57b6f8405d58c814b55c8ad89f", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test-ec2-instance}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "71ec4e8d73b9aae2218f697811c5f8a3769fb7d8e5b754932208924fd68cb10f", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "65de401a1a6d072ca37f926153076b6abbf568088794547b7bb5478f08c642a0", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "6503dc96aee5641ef965f5c227ba579ba20c8b359ab9bfd7c9d17e34eae4981f", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "f158f107b10e43fafafc2ee787fe00da46ab7a00ed3d1df3ee61d7c1e1f35ee5", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_private_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", - "similarity_id": "f5eaefa76d668c0d8d023406adcba65eab713450bfe0f79c38d02c5591d54991", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "125405ecf869511331479d90e20fab98229b5af88f2f6467b6a22b5e2d62d3c6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "489f8de872ec8586a445b73413d1acc5b2887f01ca8705bb09fe24719fe1441e", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{priv_ins2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "7d04cba353979c81931ec8dc8453c7f89eda7f3a73bf340e271770d28ec25969", - "line": 96, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "54186cb138fd3b96778399f98a0d4ed49c5f66101ff1df1364da43b8e3e0e746", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive8}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", - "similarity_id": "b06d4225f22edd2f8f5d0a2b5a1aa1c150f9dbecd30180726ad59d7d4ab3d43a", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", - "similarity_id": "508e9eddb720ba7c083332676eaccc4971acbff151b929496d013e0abfcc277a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", - "similarity_id": "451cd05bbda645079f06ec60029c8010c63ba9364e0a4ebcb3b102c7be2686b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", - "similarity_id": "a55c7aeb90b6ef5522bf23ed2037a5faacfceaad20f9155d8b5f9a1df27042bf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", - "similarity_id": "49fbefb0e0256a4d5d318dc6ea11da3b8d9767643546ee9f250e0d36f9e814a8", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - } - ] - }, - { - "query_name": "ELB Access Logging Disabled", - "query_id": "20018359-6fd7-4d05-ab26-d4dffccbdf79", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elb#enabled", - "severity": "INFO", - "platform": "Terraform", - "category": "Observability", - "description": "ELB should have logging enabled to help on error investigation", - "description_id": "c745bca6", - "files": [ - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", - "similarity_id": "c01f299eb65b7e9b982121c67b2dbd5ad10537efb17267f6997749d971edd96c", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", - "similarity_id": "72f3042909fd9f50409024615bec4e3b911cddbc7029f5e7ed812cb79d05af51", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[elb_http]", - "search_line": 0, - "search_value": "", - "expected_value": "'access_logs' is defined and not null", - "actual_value": "'access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", - "similarity_id": "9f708aee741b03d2e3f52ad84e249c96d5fddbf697ca39d688fa594967812500", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", - "similarity_id": "812afc05a6aaddb845238634c5159e5a1f74c5d4508f53cfa4bb3f75ad36955e", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", - "similarity_id": "19ab34360976fe242bf917a105df0fd039d5098eec1f3a4a8e871a291ef2f33b", - "line": 39, - "issue_type": "IncorrectValue", - "search_key": "module[elb_http].access_logs.enabled", - "search_line": 0, - "search_value": "", - "expected_value": "'access_logs.enabled' is true", - "actual_value": "'access_logs.enabled' is false" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", - "similarity_id": "65510862ff2d16a1abb66d23df746369608870a38a654f51656ecd0a540d3e0b", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_elb[{{postive1}}].access_logs.enabled", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{postive1}}].access_logs.enabled' is true", - "actual_value": "'aws_elb[{{postive1}}].access_logs.enabled' is false" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", - "similarity_id": "5ad36bb73257067a7ec5b52d24a46923f9fe3adbd1b36830ba95bf1c1c5a233a", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", - "similarity_id": "8a57be56d39922588a43948806ad136fa13900329610adb4f3d048843a0275c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{postive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{postive2}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{postive2}}].access_logs' is undefined or null" - } - ] - }, - { - "query_name": "Name Is Not Snake Case", - "query_id": "1e434b25-8763-4b00-a5ca-ca03b7abbb66", - "query_url": "https://www.terraform.io/docs/extend/best-practices/naming.html#naming", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "All names should follow snake case pattern.", - "description_id": "ac707cad", - "files": [ - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "e285c46817744c1280bfb64d65fe9149837d658cf26c162e38eed311c7d83153", - "line": 58, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow-public-outbound-sg2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'allow-public-outbound-sg2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "bb089a95dd02b703cb65d6805c7079b1d1d19621385c8ae2fe173c1b9a0d22ec", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "25b808efb5305a4719c04521b0c05972677d37526c195361ea82d434d3fc8ece", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", - "similarity_id": "249367a7a16809302a505348cacca833bb8059d56f79fc38b9d3159deda6feb2", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "fb7f720e3e0c14747c960d76d42d7bc7932df44e3dd9a2694eb1c059bbe80b1a", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.subnet22.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "fdc03ac8871e30598503b374f8f2f5f83f1a1f2b13bb70b5c30d70c58bb82bd4", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", - "similarity_id": "7b3b68a918dd88d73ff549d411352e52b6d3aac64779e266d55ecfb9fb50005e", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "23ea1887853b7f6e594a25ebe1036bd8f183ab430fd7db729616ae6ed1683f82", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "1970a581a36226cb3e93ebb04ce33da66a9742209a17595912324918bc3ad332", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive2_1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "17f3644fa599067d8f76fecaa0717289aaab97ed1e6a45827911e007079d2ed9", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "82272bc3b87f1a706567aa6b639d890bef56e27e120db57f8941901d044e8bac", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_public_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", - "similarity_id": "f1b4d960f8ef04edf1b475c21de284bdfebf05c5d6555f481f2a698975426224", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "1a617967c789366f442dc5955cfb0ff806fb07b31fdec254094ef9d812c1a9cb", - "line": 29, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_codebuild_project.project-cloudrail-test", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'project-cloudrail-test' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", - "similarity_id": "288f49cb7fdadf5884cdd0ed9d74ab1e309e072729ac652684e20fdd144b7f0c", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", - "similarity_id": "f21800af4a95b25a989a85b4f4c68211509c0459fc43f64565422de2d7d88af5", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "e7afb4d47d8e8fa79af27c06e63c87971572c0e595b47c41960c2902f19e1454", - "line": 29, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_codebuild_project.project-cloudrail-test2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'project-cloudrail-test2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "0ebb40d910829f1b4ef3d61d275c7d7db992c2f1973644867455d7ba49a163ce", - "line": 83, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "5f74924975a4e69a7dae209cb8c429771cab9899afa60a24254ca1f25f50f21c", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", - "similarity_id": "d8fff975a526e3c952d7c6b2ecd755705c2addc22335dbaa28c14976e6fcc6a1", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_kinesis_stream.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", - "similarity_id": "d1e479d20e2cd542009cc3c6aada03eefae26300dc160c89347a0aebdac769e4", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", - "similarity_id": "978614fb65b98517014164e54540fcbe864913d6f4cc1f9d5aa68f582b306e2d", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "9cac07f936c7f13e03ccf37276b76bc4742173102f001e87d7cf516a41cbe221", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf", - "similarity_id": "5f3eaf2862b13851be3341103d5d8cd265ac3968aabfa0ea2ad1840a774e57a1", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.userExample.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f5ce1190f8358062caaac0020e1aa210ec67c07ab9084e13a40cb47a590d3d6b", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", - "similarity_id": "15ff27f01b200ecedd0a83e4e1efd6d93cf033c5c61f143b5fd8de26b4c4083b", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_snapshot.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf", - "similarity_id": "8bafdf47d66f2c7a9423bbe8242a57dd35843e3e9932bf4b34c91ae6f9d7a570", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "0c771373aa6633cf96a57199d738f9f407b141f753503dca438e839cdd678e1f", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public-subnet", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-subnet' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "8a0343d2f0b970dbd4144cbe4eca4a3388db8db7b369083e22b46584ac99ed13", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_public_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/negative1.tf", - "similarity_id": "9a40e1c74b2fe8c575b889930c74e3345026bdf2f5ff04ded847ecf4ab3e9373", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.negative1.tags.Domain", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Domain' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "56eaf383e2b555fb35ab347b75a23dd4eab76f2b659d1511d67eb6b59d770113", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive6.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", - "similarity_id": "0f5f90d5bbcad7a2d297741bd8de2ffd89a47f75f93ab65d554ae79300cf9b9e", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", - "similarity_id": "483c2ee5e7c33df609593b73aa41ddf87a5b88233dcd4bd1505a1bd946fc4b70", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", - "similarity_id": "cf4cb2606670e5f17c971f13a61dddf77da416578b9569852c7db5bdee1950f3", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", - "similarity_id": "d2f1064ecb15fa4f93c25a072d0ada3c9753f2fc8ae2913bd4f877a4932e802f", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/negative.tf", - "similarity_id": "964fad8476d3a107a59f3992c753034699785ec5c1d116eea05329ac178814a7", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_api_gateway_method.negative1.request_parameters.method.request.path.proxy", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'method.request.path.proxy' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "7cd01288566af4bf2b73a6f7beebe13dd6db4d4c5b1fb83ba7c987c66e47471c", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private-rtb", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-rtb' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", - "similarity_id": "f20dcbf0b8553c5b80a8f07498b2366f84fc8cf227e5a58036af46a58741321f", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "21afbfad8aa9bd96ccab656a78fedb404b872402df16b2077d1ca92fc3faa808", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "dc5125fb387c566468c7b2de011e9319bdeeb7ea0c8b64f885f80c2c6daaded9", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", - "similarity_id": "86929a4af02c4693e76fb46f89142a06d29584ca7150d3016fdb71a578df7f50", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", - "similarity_id": "23dc445910499a3ae192cc9eae493d42c161fc88cd589e023b16da6092461b0b", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf", - "similarity_id": "4764f67ca493c73cee064ad03fe492090f4521dd42b93c618a53e1509222acd3", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "f0bc49a64609c51dab8b4e2e947cb2e6cb5841677a65b2bc38cd6f6ef98cad68", - "line": 62, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_private_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "6b9aaf6736b1ced69f0742d42b60bae52efd4eb2445342855d9982a9b0013db4", - "line": 109, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "10c4c0f6483b14a555518066c38d3b0bc22c0eb86d97a78caf238f27cfdac012", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "59afaadfea06d7788c1ff8df5bc1528b6468c3346002a4f184f4973c13b8e1c8", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "af062b913319f77ce1e0b7d7d5b8a52f75b4a1e0cd6db0125ccb16ae5b0d3ab7", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "062ce6b24d4c2a30afed15c170708b1e18fb288da53fa75ee1781feca8c51a4a", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", - "similarity_id": "803c1d13da5e73e923414a54d4e9212322c9dde9064be6e78ff64d405f22a916", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", - "similarity_id": "5db62a45bb3a74774fededc0852114b05114a2c6cd92460f0f8504afe7a9c20e", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf", - "similarity_id": "3fe57aa9ca515ee74fa96a39512853ff4bd06de289e03d4dda430ab89ba22cdf", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf", - "similarity_id": "1c45be234ffb38de00f40157d89e4e6bf5ab3652430faeb0fbe7cabf41d98bd0", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "0ac4ee7ce2e003690d7ef27eb55aebfbb2ec45fa55cd552e935e69542ae89be3", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "d3dfa853b33aa00fa95ccd1e7c1847a763f28470638727e02b5ae8606853e7c7", - "line": 27, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public-rtb", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-rtb' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", - "similarity_id": "9c2962f6d20b3b5623611395337d08e841cac569cedc80200fc7a0ded350ea82", - "line": 30, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf", - "similarity_id": "ab3c4c6df7b2fb13dce1fd66660eda1837da6f9b49e48d7dcda94c0b06b34f1c", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "0342ffba90a7404e647fa73d5847228d5684b32b9a8288ed9c77e3cfe9b62c13", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_private_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive3.tf", - "similarity_id": "9e1758fac03504ee175af4231201b9bd84577b5005c0750d6f53394db7c8c4a8", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example_3.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf", - "similarity_id": "fac5a2ae883f9a5c7ee3dc3a9fa5fc69cf9ae4abb71ef3237bddec87302a8e16", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "3fe0876526bf85bf5e2f00a0d9d522d8eb01745e486404f98a7fdbbb3f49a3c5", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "2e13b0e7032957cc6e1397681b8d03076a3b00b81168bf98909a3596ad795810", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf", - "similarity_id": "6271733d11dd17a39ef84a9095012d31f0b218e357306dcdc056bdd00655363e", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", - "similarity_id": "09d88e5fea5fa6afecbaf7b295db58fda792c1d7417f1c5d06bc55417f086026", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf", - "similarity_id": "b6b2eb0e2dd361bbdbf853c36bffe16141ece247f8fbe9be9fa1643fc546beca", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", - "similarity_id": "f96178d77d96eb582284c126a1fde37e0c8223d6d63e3a580c9f0e81fba7eab2", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf", - "similarity_id": "bab6ba5d2e5821f229958633010fc8afea81ebd28e6507b101ca6b2fe0c68711", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "e03c7b9834666a08e592f7804026b01a9a09438a4e4433678bb7b64e982865e8", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private-rtb2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-rtb2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", - "similarity_id": "bfc35e787442999874e915c313166a6205b26f4c5ea1f3e0cc9e4b9cb8b392be", - "line": 26, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user_policy_attachment.test-attach", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'test-attach' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf", - "similarity_id": "0aad00304ed7f1ab3e6814d9ac57b271e065c77dfa52d0338ab616b8c8b4dd40", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf", - "similarity_id": "f81753071fa2fa5a6e0eb4107b9b2a9d65cec53d2a0fdc23a1e8a029c2d0de77", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_role.positive2.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "44ad5328cbb17b4693f641c4fae447d3dcdcbc36ece7436d7238626704359f8a", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.public-bucket", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-bucket' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", - "similarity_id": "7464e24b389e0b20dff3e2e55c2c890c4189871e3eedf6c945570bfab96f4b59", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "d0e19663ca3507af85dc5854d92d44886b56a7ef9567774ac473d346c1986b51", - "line": 139, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf", - "similarity_id": "f9d404ccd44d8186d4ff1e40fdb7bfbb963d282b313befe49855724c12701eb9", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "460de1e86a1e473da52f468c49d9852e1eab2f87ac75c4d432cb8a8a1d562604", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1_1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "ff874131a1a85afc40f3d67dd2fb8c0013ccc9a260fec89b934accae44a8ffb8", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf", - "similarity_id": "2739d53a9b5d288508d4108d8f436a71d02de5f8410fcd886717dee408915ad2", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_role.positive1.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf", - "similarity_id": "ececfd2c61ac7da7d39e533fc11b0d6bd58fca58fcfe52c1e728a49d575f08d0", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf", - "similarity_id": "5ae2f209d0ae608b893133bb7cc1bf544372ef6d3a06563a7193764858663f4a", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", - "similarity_id": "e05ba10606cfa215c5341021f319d454c7b5c602be6da75484e606a15d81a4d1", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lambda_function.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf", - "similarity_id": "a1fa6ded2e6186d02516f69cc904b5d18404474c08a41f8fbed4bbb7db1154f8", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", - "similarity_id": "b009ed5cec288813d215190dbb81b68fbed8aaf487cca891ac7c0f82018afcce", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf", - "similarity_id": "adcbcf40ca30b9377c0d7ca9fa0cfec9bf12ba46ef26c96eb89cbd40abacf63c", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", - "similarity_id": "cad72a84374ca243aa1fc49f55ff07cf2fefe9e30942204191a4f8bbe6bbeca9", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", - "similarity_id": "534530bbaf08c1eb88cd0a31e19d768c5d5845af0606a6ab2cc6ed1a75f49940", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf", - "similarity_id": "7d1d0d72c4e437a486d8e53d198c42b07086f3a236d2069534b4f4b6e433e9d3", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "b97f935be5ab2b2049fe438a622f062c5d7e466ed269f20b24b7bb2d7725bfc1", - "line": 109, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "c1d527f6ba832ca4340eee6001d0d5e3843b2bfea626cc87b863f9c2a2db7115", - "line": 30, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table_association.private-rtb-assoc2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-rtb-assoc2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf", - "similarity_id": "b7b63adb265c9b4f6b3a9e08227630a85811f19fe9c4a50c524f3d0db0894bb9", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "8d24d238306dd69b2aa2af36356f85ade71fdafb7093a171ce58449719480b9f", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudfront_distribution.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", - "similarity_id": "e07ff69df6e2228fc5228e598ea4e148032ba3df7aa33109f7eb8f2a7c831efb", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_snapshot.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf", - "similarity_id": "51a02386182e012254aa94155f280208bc1955291995ce8d05f1e6efeb82c98b", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sagemaker_endpoint_configuration.negative.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "bb5573b8a5cd318882862f7a7546ec80bd9bd6eadb186c65dc0bdae50af42ff0", - "line": 30, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'dynamodb-vpce-gw' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf", - "similarity_id": "13a6e7ab250d5a93866caf906483a6a0cbcc86aa9e5306fab7a50c7e769d595e", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf", - "similarity_id": "90bd1241349c29013df87f86543d4c5338a9de2d2a089c202194529d9ac81b63", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", - "similarity_id": "a26113c4ca1c3180f2e8ffbe6ac65e358359c93856f02bec7388e48a2517fa3e", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "dd30a1007289f96867258b291021c33db43ad8bba51d196a35c8e344df8123a0", - "line": 26, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private-rtb.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", - "similarity_id": "f402c4feca474ab16da283c95b55d68f807647a97711424b00d48b367b1e2d5a", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", - "similarity_id": "59d8999c5b1c0b73d6287ac9db34a2c284426f63ba16487cc3ea66f48456a4fb", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", - "similarity_id": "9b4603fea9b0efded51619af883fadeb4ca8e2796c3cbc317fe015169899f64a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", - "similarity_id": "8bc01381c550271a155106eff2a3eeb4755544bd7dedcbaf8ca5bc3961676ed2", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "0b7d3bb60db93ad3ce03d3ce5faae191a9b8917e6062e6b556b94d9a5ac2aecb", - "line": 95, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf", - "similarity_id": "02c2d91e73e579f962a03a512d2f698f7519c0016142135cf144dec1641e729f", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "6e59023006b47af8abb7e3a03e9e0bc42a3459c8094dc3016839b285a7a7ffbe", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", - "similarity_id": "90d5f9615458a7d30e2749da2b8aed865dd9b83cd172729788cc64fc92d134ac", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf", - "similarity_id": "f1f08f7e1d3d2646727c0cd3a4db61e62a8df136d79ba27ec120b12f56ebdc78", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf", - "similarity_id": "39e843162e5ff9727d5d6514a55d842054f346ca1d4fe5fd057a3e7fd6e3b4ac", - "line": 55, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", - "similarity_id": "2fced3e4a432916241a8f576221a145f064e8f96afbe135e02e3c13db87f17b2", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "92fecf6fefb57bb1c1623b3f669404338bae42b864c0ff70abd51677d7340f38", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "f4d5662d26f3a08cf7ae53d520c7396f8e54b31e46789fc097737cb17897c987", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "115a6fa919db0caf4ba7e70576afc19be9bdf34d0616d9a5c8dbc03a17d807ac", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "3fbe4caa45c9ec45226431bd7079a423f495ae80914e00cd892e8a53f53398c4", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private-subnet2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-subnet2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "1a0a6cac6a33aa36edb8f6436c3ca1fdab04d59b15060e005906f55d46cc2711", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "output.kubeconfig-certificate-authority-data", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf", - "similarity_id": "16df3a8d925cc01b09f526b22a4966c2728398050fea4b15a7c056b679cfcaf0", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive2.tf", - "similarity_id": "e6f48355ee608a1a8fcdddd53787750b458f0d086ae34bfe2fcaea197476dfaa", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Domain' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", - "similarity_id": "63865bc2a7d9cca07948892098d7b8ff70d03aace87f2f54ffe90d2d36f09897", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf", - "similarity_id": "997d79f4d6d6478069252d14b449b1d5087f94ad574f471d04ac57217222708c", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf", - "similarity_id": "1c3bbabc1e9bb856f41a354cf9e04ca2b0d2bd3e4e5264f10caa6ae175cd45ca", - "line": 55, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", - "similarity_id": "c7ed64fbe5dc2463d7795b3170b98eceddf9e1724547e00346122d6581ea4d2f", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "2016ac07936cc7221690bcb2385bae2dee2d5a7b3b6f3c07c20d6baf248ee889", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "5b3f5a784fc0aa797a0c3260f6a8868e6406c3ee4fc72095c7c2bb9cfae4dc47", - "line": 120, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table9.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf", - "similarity_id": "83ab6aee6cb6bb1dc6fcc0feb95e35a92e1de5723a7b9341e22d75597bda895e", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", - "similarity_id": "0fc372e916ff9c31d99aa7daa6bed16fea8cb781b93d135097bd8fd3b0c2ac45", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", - "similarity_id": "c723df32e44bc43710c9a900c165eb0fd6f6cd674f9841f3330724d87736b18d", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "578f053b1fe8d03db644bf8c4545334caa6e110372d800b7dd5f1046aa7eb9c5", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "9ef5b6e97b2fe73c97bd611b3670477e3fcc02087f95eef61e65c9bf9ce4c761", - "line": 43, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "1e264248f099dd9f2f1adc0d9fb46c9a6ff62217f3450f95788a52ce778d080c", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/negative.tf", - "similarity_id": "30b7a404e2378ef01afdec0521858bc08bece75f5f4b4947a1b56412f9262e38", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "data.aws_iam_policy_document.glue-example-policy2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'glue-example-policy2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf", - "similarity_id": "335517550c254c8f28ef87f90ff36d72acd5fc7584765cd49d19b91a27825df9", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lb.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/positive.tf", - "similarity_id": "6fb51acd7dae65fe0f10b45ff3c6a1598d3b1c6e12fbfd1567bdbe47191545c7", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "data.aws_iam_policy_document.glue-example-policy", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'glue-example-policy' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf", - "similarity_id": "5435f54c7d2ab5431451961eeb20b9a840f0759e3a9eb993d6fe6e831c68357f", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", - "similarity_id": "6c5e12fc6e4b1ef1e35b5aa7d7743c375eb00458ccab3581c2179e877ca69006", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_snapshot.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", - "similarity_id": "4b40e2d979b4c375704860f0b6f2a242a16d68e79503b968eff4df35b035b77f", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "543566c34459dc9baed23a1e92c7a91601b3a52b4e1edc2ca2b7167cb4f0508c", - "line": 81, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "9f1561e249110a2eb98d6e0633e8014a3f466b581006039d366375a0edb2b00f", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf", - "similarity_id": "2a3b69cf0d0b38bf2e9fc9b91d3d73f7b560c2a2403b2a0a371a06b59a44fc5c", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "0a4680c4155bf4f195e1de37443114af0af3035b8d1ee80e3359aa5c3782b413", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", - "similarity_id": "a8bbd3aa541be1122e042e27e8a41648c0217b81a6fdcad7e4d53ededce4d28a", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "df324863f861fdc996801fb27c2ac160ee953487f9dd1a3dd2c3185f9449fa47", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", - "similarity_id": "9b80b92756cb3929f9377c92e4a78c31ffda04f50fff6677a2a67960ad261fd8", - "line": 44, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "4db5a0d916116da3db0c2f8b7c3d4f888da53a7118cde204a09835ba874410d4", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", - "similarity_id": "bc08272e483de6133c3972d89d5f5cc697b73f0b174bf95d23ba83db06575d3d", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "6701c8c45247b00ccc38b21f4e7d58e030da5fb7a082edfac3aadbf639106830", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.b.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", - "similarity_id": "315d35b405e64d2f728346b454b8ad3513313f1d965d40572585c59684d99a74", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf", - "similarity_id": "7e6e469548ab15c9b630d93702c192cf750af1824286216858cac6864756f8cc", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "e5591f70cb580b0636318377db81aa893414926a4536d1c2e2b05c83bac37453", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.b2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "52387728fb1b426381d4b03ec2945cdf30f79fa0a25586c5296d025bfb0b66ed", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "ae99cbe52e6ae4dfe3a752ff5f97c6cb479becd538a14016c156150441161af3", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", - "similarity_id": "c7f18bd787ef199d572dc295afc618c81ded903e1547f15021ce435375ccb179", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "8692f7785f63f1b48e79c635a2bf5f18ec124633ebb8e6063b373ab9ef820edd", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.allow-public-outbound-nacl2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'allow-public-outbound-nacl2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf", - "similarity_id": "dcc696a805aeffc368c853524bf2c3afe99c55bab284badd1d62710d2378de7b", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.userExample", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'userExample' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", - "similarity_id": "2305867ad6af7819e9178eac0212185894988341e60c0f274505347e0177cc93", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf", - "similarity_id": "3be9857b94358e25ec990e4471a1758d97a8ce78a36b3345fdcdd22998960c17", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", - "similarity_id": "17c64cf7029f4297d715def886fe9e7d6fc33407a97919a71837b0ffab378712", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", - "similarity_id": "8cd17122f46c7255a99d96b62bfcb258d0d6bc37a5104ec54ce074d37853d80e", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.postive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "4c3abb074b26e247e977d1b6e1f22e799ea6b0ecde5ebec8928f195120cb676b", - "line": 44, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lambda_alias.my-lambda-alias", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'my-lambda-alias' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf", - "similarity_id": "6940f3331000184314ecd23763aa2569eec18bff94aeda9f55c8b199997b249f", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", - "similarity_id": "d3569df7c7089bf700ace4ca9be7b1b47bdeecadc6fc087c91818bd5dc3f7853", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf", - "similarity_id": "8a8aa0027c7f559bf41b69886f952c4b6f545057a731a4d481e8d9aa3a5a6142", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "8727cb1342900da9828e9e40ee067baad48f80c95f12015f797cb5e7dfad9865", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "307133df1a9eaaf2a9a894192979d5c2cce95b469c9a2843208c67ed4a4a866b", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "1c11a4e31aa27b613bdd81512eb81677a12a1bc68a12e21b4bbf1efabcd7828f", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive7.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "3c9eee6c40066f4208558c6dd062ef75c0527be3da1bb5dc64a943491e111810", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lambda_function.my-lambda", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'my-lambda' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", - "similarity_id": "4965ca7963e398ce980f95421aa1691ed34de219ebbd5aef6133eef7ef18c681", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "7b37e20d023bc73ebae63d9d915549f6a81995002e1da35b71e3f7a0761365a2", - "line": 109, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "b378c350f5429c1d55e9a741c825bc33f6d72821b22673cbfbd35b9765b7d1fb", - "line": 72, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf", - "similarity_id": "e9bfdae6edeefe5124f657ec2595fe2231da1c22544702e2dd7bbf3066fbd991", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.negative2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "5f1e8a7f4cf4f400779ceb78c56d1a026046038cd9216eceef633dd78a6b9d20", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "50eb74bee9847068263b1fbaa5ec8a15be50e00083fa6c360b4c5e9a25a4f8d1", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", - "similarity_id": "6700c65754d43b1b7c5af030cad1eda541df170f09a1148217c23c4bcb498b88", - "line": 29, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "35bc24c27cbf6028087431b2d0547aa530801c1950c5826053dc803b6aa219c7", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", - "similarity_id": "7df1c0e324a23ee700498c6437bb4681c4269bf2549fc84f9439d760497e541d", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", - "similarity_id": "79e320d298f675caef40d6834b51859ff7d7e5c98da3d2e5c8a7d53065371a74", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", - "similarity_id": "5bcb4cee3c5dcd2276015396ce014c7f85cdff59e25ac4d965538a23b4ab254d", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", - "similarity_id": "90fc9819639a5011cc4680666a0181719b8e362abf1f8d5b795f871ced034d97", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "79af0142188320b4d4fa10a9c5066d0d39139c8a9cc66e21ceb5920bbcb9dec2", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", - "similarity_id": "6313a2e3c0b81012471fed174fc95dec308473439ef257af0d6fef9453f03417", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive4.tf", - "similarity_id": "f94f311183fc69f4c6f7d065c72954e45caa8ba74be0c7ecd68009a0aac56cd2", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "module.vote_service_sg.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "5ecda317c8ca9e9703591647b06101cab2a9f099b118df11348d8295232a111e", - "line": 128, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "44fd738ac7f4d209dfd9974e416cf57f056c17267944ccd901e8d0ee47224e58", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative3.tf", - "similarity_id": "26d9a4487f88cb6e51d4e86b1759678630375dcb110e734d4caa85a0febc0874", - "line": 56, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", - "similarity_id": "a7318b1050592de8fc3fb2cc16ab17ab036a1f67aa8ed94c4e7029a7c77c44a8", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "d7878d9eb2f59d9967676fa7f9c8a3dec90fabf418eb71a937ffccc733821448", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.b.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "b5beb5a66ad803dca65033e776c9ad4cb4ed31b71dea84a540cbefd7edd70100", - "line": 74, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", - "similarity_id": "59c0dff398763a7cb48d138a04cf530c5fa794272e51deb6fb7c314c157d7563", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", - "similarity_id": "c54d5238ea84469e82c1e2b2c31929dd0dd58f1e8a13ade04fe91b20e910afd9", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf", - "similarity_id": "0c34495723c23ef97668ade169f1ab09afc6672bd3dbbc8703a3d7f7a86c8b6f", - "line": 52, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", - "similarity_id": "f7d216c761e69bf844f8c6aa738ec9a97aadcc0e3ff00bbcdf9d2336614b2ccc", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "2a2a12e5942358a8e43406a8dd050a6cd12d81483179a5ff99e8d1cfa375043b", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "6c7ee2583e3eb7c4fce379906053297bc8079049b8d94b4c4c83155178eb4bc2", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "3a1bc2ab7f01307adba959d593a03ffbb4aed82e558b8fc3c70d859c3658a5b5", - "line": 81, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "7e39d4a96d279e81daabdc90185fe295db8c3bdfea22f920a6de323b8b1cbfc0", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", - "similarity_id": "9fd3ee735208610f9635877a32761b4896e3a1a2dd3d501e8c0cf604f0e6ddf2", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "d2f36bdad7284e64fbeab52855ccf892db7869fa1487e48fa875327db858b8ef", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "50d6ce1290c3bdab1141c9e5f09dc16ad731c4911e52c9ea8adb8e72e47d271d", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "98e90a87c202ec9c754db27c109172c9cfdb9f7074d0613948a7668e65854076", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1_1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "665065c79aae79dd43577837c58312c593ff5850e98d1073c79c48a24bb8ab7c", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.public-bucket2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-bucket2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "e9e1672b6892444cd56bc6806c3388762a75bcf84edd0101249dcaf2a57a7f89", - "line": 87, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.test-ec2-instance", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'test-ec2-instance' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "f0aaadf8963c5f5d97718a01354553608ee32d1420a797222c59f7d974bb1fcd", - "line": 83, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", - "similarity_id": "2cf5c44aea2385f7cb78aece4a2df75499316cdf84446a72820f3ba2a7e6de93", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.negative2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "c71dcc8fa61cfc0acc63db2702b0a31b33bb2302c4aca82012f142677a0de253", - "line": 120, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", - "similarity_id": "b388eeab9faa9631be82b30b45841d72c751699cb6ebb8415e6f512c4378ba60", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/negative.tf", - "similarity_id": "475dbdc0756796195e226f50f66f73246fc28d0671e0a2958dd7ed5a1a8116aa", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_kinesis_stream.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf", - "similarity_id": "c23a7f01ef82b43a0217acbe265b42e2acf278fa30f99c4bdf8ea04e6701743a", - "line": 27, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "ccfc5daf780a3789815c06fceaadf346a147dd09bb489bfeb106edb9407b3d6c", - "line": 154, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative2.tf", - "similarity_id": "38ed35d4d3a02f36700f20092c885c16472af6bc036d8a2c83d6939f4bfc3e5c", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lb.negative2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf", - "similarity_id": "a3fcf3d04197008fb3e7f4f813613df56470885b3e251f4374834cff846fa617", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lb.positive4.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", - "similarity_id": "1500659d619492c204a4a0f7b322096af37cb86bf969fede192390ffc99cd619", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "19d10d7985021871f6033297df82ca5d22b1582839b12f5f83024c731c5cbd00", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "0dbafb3a8863ff274ce05aeec673b3c1854f5616c493be6c97474f5d80d43762", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", - "similarity_id": "ae713279a1e484fbea5893a4654f8c5c8512f1309cf6c11b73c358391423fd43", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", - "similarity_id": "fdfa2c9bbdc0bcdd6295aecb3e26bbdc0d6e54cf3e1b7bad7336c3ed4034e671", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", - "similarity_id": "1751a09807576026912e4b78b26b8396e31e4e8734bae6b3e8b889cb5f272525", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", - "similarity_id": "4031d9e9744797bc74017041774553f93773c80cca47b6b044fa27085038dff9", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "47f3e04d8a0ec915b1f2e3bb3e765afbec536f003daed8102eb3dba2472d0f33", - "line": 94, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'sqs-vpc-endpoint' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "0713351a31886f46d6e90b8d94acb01ca5989eebcc800b9bed88bb5137a6b88b", - "line": 74, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", - "similarity_id": "73edc2121b46fdc84b7d7604b925dd7cfb2256664251f054904d2d9cb707c000", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "086b60bb4f6c14c070bef48f0ccd9ee2b66850e8945a46e3e8ca597fce3cb7d2", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "2eeeaaccfbd6f5f73fbe310b3afd9a62e2608da129055470cef48297c4d3fb10", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive2.tf", - "similarity_id": "3356ec5b8eb065f1eec6765e2209ac7d1c49d6d7110ae1f4aa92ee653301de42", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example_2.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "24e97704b1962ed61091f0925cbcd5bc4a5b1125e1ae2bad3a2d6fd2599d240e", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", - "similarity_id": "ebcc61a27164a010d47be050245a8ff191b806f8fd44351885652cab1a89a9b5", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf", - "similarity_id": "32b5026c966424dbfc66fc2e49a99d954c5fc590b696474084111f9f72f19edf", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf", - "similarity_id": "61513477be63d8ba943737da51d33aa2938db14dc24c3d02a7eabfafa162fafa", - "line": 28, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "2a58b5863b6307644c7b340a03f9c9e14f231db63449673d459ad63b1da34894", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "6fee34612052885b14eebda817edf162609452fa61ed1e8be30eb36fbd6d77bb", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive7.provisioner.remote-exec", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'remote-exec' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "e78c7b2c62dc82ca09bd6e0016271759404f4724d991198aae0de5aad8c42e06", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf", - "similarity_id": "a9ba0ddf8330288eb9998fb5f5a4f5a97322dd69d16f7e17223f37ba9bbc4cd1", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", - "similarity_id": "26783256bab02b2d28c47d25e504869d83efce0f7204fb461df426456d5bc975", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "9ce5ca32d2be8cb4b5f4314a216e0e70861a8c6f1d9c2fc212d1bb78e79a6528", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "786e8be1c2459e36c29182055a1667bc7341067eec4f57087c31691dc40819fa", - "line": 138, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "6a4fa4e9f565d7a4d2dc935e6d126cddf951fe3784f66a5bf0b13e0763baabcb", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", - "similarity_id": "a0553459cd189a443d1cd7551efdf928db7fdc2a22bebfd9c0cd06973d2c64ff", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "ab78a10ac9b26928b3121277a3b56019d3dd5b47dee3631356c65cf3bd057d66", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", - "similarity_id": "9b1feb92247beb372cd45bff6bd53826f5e18a2072d08ec23a5d462d07f804e1", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", - "similarity_id": "17e519c8770e12effc16888f36d1cc90b28163a4be772cda3adbed539da421b4", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", - "similarity_id": "d865634b9d7fec4f1350d46129fa0a29400c4b8eb8a60870847b87d4573ab04d", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_acm_certificate.cert_2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf", - "similarity_id": "7ba8578d93dad4cd4aca7634b4d4f7369a9ef4ac9a3c7f7a6d8fec849c813fe2", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf", - "similarity_id": "865681b89ae6bdd0b67a48a3f86045dab83880633331946003888b1ba91bccdf", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf", - "similarity_id": "a46cc9f8fd0900ff2ee0d26369a66590ba7680006f1fbbc8d7745aff62d97575", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "0145f3e78f8ba61031ac13495d6b874847d3b943ad067f8198f6a2bddd0f5574", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf", - "similarity_id": "5d09e2551e958c561c91bd38bffd0db21e18af2266dc24a40b46ba5b2b7280c8", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "9dbba7097368f4a80174261a25961e02061607a7d703a1f977f367c6fec3caa5", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.allow-public-outbound-nacl2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "bb1ad36bea3ece3f9f013a8aa9d661f3c9407ffa0f7ea46affb166fdc818fd5b", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "60d6d83b0af93cefe084157529684dd4318170927e7fa8d72a2ef5fd0afd1932", - "line": 124, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "2af5a4fe03d492ddb6482cdb9ba9e466228470110b1c709a9df627577b9ae88f", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", - "similarity_id": "0bc12158e9d52c8b79fcdfbd4a9f69491133d3c89f4047a3be5c0f1e2e797bff", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf", - "similarity_id": "ebe2775b4765d5fcb5c839e3b2f166403e2e86b9db7aaf036bfdec4e15c5e572", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudfront_distribution.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "10c0ba75af25933a1c4becb17dfeca02ebc42834bddee2853eb47b6221821480", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.subnet1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "951db50c6b1762169a16b25d2c63e2903d9c2290b300d3d9a4d558b667f5e213", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "a8b7997808a56c7980cf6dc7418f3b256eadfd181d7d3a6b0b42fd8533eac280", - "line": 21, - "issue_type": "IncorrectValue", - "search_key": "output.kubeconfig-certificate-authority-data", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf", - "similarity_id": "535f8bcbf9da96199cad5cc9e489e6fac5655bf595e2df3a34d99dc6d270d494", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "dd38ca482ff1c6c20841317f063d6d47fdc625a0853fc6413afb8e27588d1211", - "line": 140, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf", - "similarity_id": "e6e587afaae6f76ca2f61e611d1df4a9147e7305f4060e939c936569f2bc5420", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "3d94bca96c25d76ea9f1a5ceda19ef7731508bb0146d367d7d6880216d7bafbc", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", - "similarity_id": "cde9a2ba0cd2d31f64b3a2e5eb3d523c9994c07d3ca85444fe485462963a71f8", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", - "similarity_id": "93fc580f957201d5f6ff91befbffa2f245cc8a50abb18e342ccf65abc72e3131", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "3687bfc3f57e70c120f1f281830ea8ec2236d419e8e70ae424950647bc530872", - "line": 21, - "issue_type": "IncorrectValue", - "search_key": "output.kubeconfig-certificate-authority-data", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "8b191b4c530e73f78276ac957131c580821afeaf906b0f0a34b1264b7c37fb66", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_api_gateway_integration.api_gw_int.request_templates.application/xml", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'application/xml' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "8eafcfef5ce81e94bc058735983a7b3867152a8d62c93875545957ee980284fc", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "e0cb274fe578ccba2ef9e68c45c5c8d23ae1ec259da75fca5f6a882bf1e834c2", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "d2b6898c08fd6e18d56623025f8860f938a0ff4e1b468c80b49a15a69b5390bf", - "line": 141, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "796361a3c2e697f13d5850a58bc6fe8834dc8e8d8da8d3a7bf9cd0a8dbe0c7ad", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", - "similarity_id": "0539d229456ae9a9283e17c97a519794c9c175182fe32f47820f98da7179dc0e", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "8f6ca9855836897a2d8dd2742032303594a2382820111e672053ad25cb2cd4ad", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "1fa8f748088eb81af5ef4cfc38dac2cbfacefdd3c89f0c24378719088bb2ce84", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", - "similarity_id": "59df7a4bfb60c69399d31853f248c62c7e65c4af3ffd6ff5bd069ec7b7866b58", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "6e6970ba502f16fdb7c075665b14de7d352a766d2c46c263dd53c2935a722b7b", - "line": 109, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "a39ce5076b8c868b51c3a365f1b1200996f846b329171ea312fbd488db067a1b", - "line": 141, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "e4e52aac31400727fa2359dacc89a8f020640e8b89a5170c6fb0bf7af65c29a5", - "line": 83, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "5bccec8da5485b97289e45302101de755e8ba4e509bc839213a2dd395db0b331", - "line": 119, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table9.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive3.tf", - "similarity_id": "96048361e52f0229a1a0f007f7f87b13589536671b340eaeeadaba680b91ca7b", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "module.vote_service_sg.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf", - "similarity_id": "b01a895d3c2f78e13a0b076a3b1096b2a65cb25d98a83c6c83b1acf7f74eabf8", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "7a96583ac13c4c601573f52c5b8c4783fe96e8040e3b100963894a2678c5c3f3", - "line": 155, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "d34a1237e85bd0b8da1b0f159af81e6580e77bd1e4a96267fc73517404c96021", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "290c24060b9368587858021c60820235b0ffb21194d5c9f9e27ffb7326b07ade", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive2_1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "534d52020b8b62d50f31264d52899df584867067cc5947ed2688ebe7a2d47cf9", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.subnet2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "6d8e7f4e7e86c7fa5553db570235f9b572d7f8df708bd276058f8d0b66c3c136", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "1619c77ad66fc3283a13cd8215d4a0392d36fbc5f5121b22e466febfa1f11141", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf", - "similarity_id": "814bb0d304839447b58a2d7421c574c026e58c6750ec8a53d4d8bce60fdad133", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", - "similarity_id": "51e4701d93a00f6c769b722fb3f730f102f08e19ff8aaf572aef0479b37cae41", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf", - "similarity_id": "7ba565ca3aeb22afb29ccf57192052943c34243394659afe2a7bf93031eaea3b", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "de74887682ba82a259d48ae5b4988dfbfbae18c6fadb4deb5d63bbd8c40cb7d8", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "05401ddc1a4c38edc2470027615a889a75c5e47b5e1b9eab15db14d8c2dfe701", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_public_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf", - "similarity_id": "6059faf1f4de7fe0636491dee6dbbcd8083404accd85c0c04f49ea96743c47f1", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", - "similarity_id": "4c4f88f44420d277b2a6f58b9ee814c57989b1d300cf1663f89e6020cc1aad43", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.monitoring_negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", - "similarity_id": "b09ee313bb93c1cb09fa18a46aeb6878c3951fe7f72c96cb63ac497acb83a7c8", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "69910aa882a1c6bf4131a1f472a875059ca02027f1daafafd086c92691bb08ef", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", - "similarity_id": "d8fda90918cabf8cd22240df33aa517aa2288f4772b41f5bb1481546c1d43851", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", - "similarity_id": "7e41185d1103bf9b5c208e36afd3cd3df4db9d46b5af13dae2113bfbe3ca0647", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", - "similarity_id": "247a223eb12a95581c4abca3a3404706aa8ecd13b7d0dd9c5a2799ac77157834", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf", - "similarity_id": "f1255825ef16b08d3252268918ba10d3a9a74bb214d709cfd703fc4393bd3bd9", - "line": 28, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", - "similarity_id": "7768b79599ca82df2204d6d3e92a19b84b6938a99ed28d4ca223069edaf211f6", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "d5cc18c31b11f5629c2664d404e2dfd30081a2a7f3b085a34b74809fb394687e", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", - "similarity_id": "c18d34ca26d5a4ecb9e0c3196a7b0ddb5db68d8211d5a3d0aad033e2747559d2", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf", - "similarity_id": "661a5184a7bd067625cda25044441d4455b9871ae06b8fefb5fedef16d68652e", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", - "similarity_id": "ccf18e0c8d730fb13c9e865646e25a4d74b1a4df4363f83f23ccd3ce4ab1c9b6", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.monitoring_positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", - "similarity_id": "fe4d74cbe2c2b8069e87929266fec56bf8c0906b0c742064297203925b54a71d", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf", - "similarity_id": "4a9240a1c9d160524ef27c114179c4e6e70b1c62d7e3eafd3003e0c0287ec51b", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "90fccc757a5a158b6e222b2d98ab2cb59523cfab8a273060faca15520cb63957", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "f4a1af720b89ebe65f1d39757dadb99840aaed7b158e2b8463c146f7ae216bd8", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive1.tf", - "similarity_id": "6d9456a2b03df937a09ffdcd98a93ebb6a32fef931911ae34a0fd19882cc6524", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", - "similarity_id": "fda413158e2f207b723acdfc8d5d360ba77cbfe2f70a512f9e9aa78a3a366568", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", - "similarity_id": "280a685aad832b1588fb92d139adc43ecbfc827714c5eeb7e050e51da0f6b6d4", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf", - "similarity_id": "2226b388b5ed87e1f649c05fa9efcb602c73e47ca32dfa9479b4a9d757333494", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "966e241f56dc379851821623812c4d65ff9dacafb489ce07d629a17c2b72c7f7", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", - "similarity_id": "c52f47808ac3afbce72efcf7fb9997732bd3a32888de579ea68234dcf2b5a88d", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", - "similarity_id": "1ebe83b7020d30e1160c5b96b4cab37d9ca97a8f2881472fe36d6c4ca5f7f892", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf", - "similarity_id": "cb7d75e0c0647a3abde82049494fd1f360c5513d80554e3b77112a6f9530faee", - "line": 48, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", - "similarity_id": "1e95d4994b101b5e32dc18dd60e6273947f7126b85690055781a008e9caec078", - "line": 48, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf", - "similarity_id": "897a1f5a3cddbcc644f9672c3015c60515a2177a95611ee43cc17a49aa68e383", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "0a3f149ebfa1742f94ddd4da62fd1a0252ae3b8a2ffe13823ac752bc2003d6fa", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "5e5c011c45bf992ca1c0e946ef4b4bad41051ed3f73c4209c80e0edae6ffc948", - "line": 140, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf", - "similarity_id": "ac217e2028c7c5a0ed93bf521584f165f86644f83e4272e3146b449881048783", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.es-not-secure-policy", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'es-not-secure-policy' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", - "similarity_id": "6845fda5f141490c132da03805391b295803f49ebe2044d974371bee395a3785", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "3c17c0b7663cf62b436e93cc64cb01465c1d907b7d2201e2e3d30b49c6d107bc", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf", - "similarity_id": "22c53730bd093a452802b3c2a60e284a719960a57af699c6ef5641a9e2e54e47", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_alb.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", - "similarity_id": "d3c5e661aaf939bab5ebb33c2cdaea62439f28215261f4e8d951764eb0898913", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf", - "similarity_id": "c9e42c3dcdb8d4229fbfc51add88d064126d202a1f3adb480ca981e49bf21abb", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", - "similarity_id": "3ab313038e15de5a7e6362ac4a2cd78a7e933c2fed23e85d31584572bdf9a4a6", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf", - "similarity_id": "ecc815f005003a2f9bddba2729d7baf07a5b6b9eb0d8725b76911c95c077815e", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", - "similarity_id": "8d137c6a9b7d4287a2d55213b065d8cd48058a0b2795c3d817a1518103ad197e", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "a5594e333c1abded154035adcaea38a80433cc5662ffc6cce3979f2a286418e6", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.subnet12.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "413bd74b0ff0fcf83a19cec882d1728b4f0a7869f22ca74946edbef5858f1c3c", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/negative1.tf", - "similarity_id": "28b1ed5a657f2dc08e11d3227e8e64abecb41c026e44d12da0c8434841c0c10e", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_acm_certificate.cert.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", - "similarity_id": "4ea82e2739203c6d392fadb0512dc76afce1468d9e8cd218673d32434c719485", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", - "similarity_id": "996de3745e0aef295c015a3e1f387e1501402eb88d82194c741d0222f1a7c0b0", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "7b5a2b08e20b0176ac4532dc17a6651e22a0a3da4841b8aa5238cb2ad8197702", - "line": 62, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_private_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", - "similarity_id": "5557f670f3bd973320cb018ab3ec77586d6407db810e337db7d5f669ca2adf3d", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "ce9b4e603f587319f6f15b26fb9e52934fd0710171487325649cbe66a8e5aaa7", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf", - "similarity_id": "54712e918be38f49acb889405d78e2fee1ea5634fe73bca90446b1b52dc9f881", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "a5ae0df3456797bb05983d9e53288ea82f2a989b5e5e828ea5c302459b50cc53", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_private_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", - "similarity_id": "1fa7108e9c0d97851e5894c16f036d6f16c0173bbc8f362c9565b03c4f78ec72", - "line": 30, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_kinesis_stream.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "7a1d8eb9a680a4691cf0ea4015b191113d937e42be8db6bb19f29d31a7844082", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", - "similarity_id": "0f007a9455e1729085dde42e8be9a029be2af3d3db7d8fd9888c1143b22a5fe6", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf", - "similarity_id": "8e906c3c4433cff6db1ab0df4ccea9290ff8cfc5648c1aabbb2105579b7be46f", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "d13e2f8f59828e5b06b6c001dd8c13b229d8c246e982737eb35e4322d3cce292", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", - "similarity_id": "78aa2b2c7a7ed650b37a9f3ae619936f8108c472e6979ddc79ef4dc53b812bc9", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", - "similarity_id": "59474ac310ff3e312c3c5e83755ea79b0491ef1cb94a7e62601cab6ccb2b2bee", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "7af1a7a8f16d9ef6fa0ccb24e87415319c739625476a7333728ba8b970a4391f", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "f1987bd2b09c6fec35cf39af0390e550b503b69cb9bb23d31285c65e40b8c6d6", - "line": 125, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive1.tf", - "similarity_id": "fc353689dbd5c0155f6ea75bf400d851a19605ffb291640d5256ac277626a71f", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Domain' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf", - "similarity_id": "1438039068adec548cb6f8d75064e329e1d47879952102b960f42318f90f1e26", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf", - "similarity_id": "14f33de475da81042f047062655adc3c7716ad3103129905df6dcd071072347d", - "line": 27, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", - "similarity_id": "9aacb8137eb39cc4d1814e42b95d3f420f04d5e3e24ebb43ddd9d737190e6f79", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "1d350da01814403119fe99a5b56fc712d8d0a5a24e4a2c284a00e25bdccfc55c", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf", - "similarity_id": "516a01ad96287f750e48673142d11ecea1506b3158644e602b06015946792121", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf", - "similarity_id": "5c93c1c5f8470842e195e36035d647281036d20e37d7064e06d7335567875011", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "237c385deb9a955f374d9f5cbeb1d983b299ec72916c0aae254a2ac6df91791f", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive5.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "6c85770e140c37d85b6cd1026f56a222e92c974e8b4436967e8586e1a6b056d4", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive9.provisioner.remote-exec", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'remote-exec' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", - "similarity_id": "23488356cc9a8a8e583bcb9a38da6d475687fed5de19c230e88607d27d00e997", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", - "similarity_id": "9b9bc7ef9bf98c5f140fa355a82d07fa71e0e7f57ed25854cbeaf772f9d14a18", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "5cd6e6ee41d5ca6b5375e464175cb57df467ba338a385134d28573bc16c58475", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "088680432b2b90e671b309f40ee800fe0f3f6c4f748dbf88daa1d8c6cacf61bc", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "2257c7935ebeeeed7e3dca56da7ceb31b239af28dcd861f14fc904f822f8307c", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", - "similarity_id": "4f8b88a0b5b2f97119d4110f1c7720d8498d6d649301e8d4b77b3e3165844c92", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "01ab6682483e44c8da35b270ba78316099089e1fbc636f292117f28332e423fd", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", - "similarity_id": "f9074b75bdb9a8b2c59bc02c1d69ee52d8aea5b682b12ca8864f4dfd1d780641", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "a9e9c79f0352a77dce970ff96b136fe437cf4361e5478cfc688e8c3533cdf24d", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "b8ed73f39cf91709def8340811684935697a0c336a51d0a5e5129673cd811711", - "line": 50, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.public-internet-sg", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-internet-sg' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", - "similarity_id": "881383a3d302e15cfae862e935a261a814e35391573778a44ef9428b76614cd5", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", - "similarity_id": "abf47f74f66d46c4593f2bd59d7a28dd7a6613e857438c8e7e4f8b1565d18da9", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "0299bce254290d328037094c61ead9d91f750e65784cfa320b877eeaa9a9e3f6", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", - "similarity_id": "6091f7175c621413c58fc9aded221821ac189094270ab30b1695af6c93fff319", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "b4cbddbc3f08e0e04af779e43310c204b7ee87bc81cc2bfd16b2213afca79290", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", - "similarity_id": "f86ecbd26c6d6f8df31e4a23bc1624a91a261ca53039ba52ef921cd9bc1cb82c", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "cc1f0fb5febd0006201a1445cf2e80ceca05ccff9d628615d2a63eac807cf5f9", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "8d84148dd5aa82e6da577edde1253d026295ce33298d7a758727c8d90f032986", - "line": 128, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "b97b93d0e270367bd986746f55c29d644c4d1a6de1b6b974f64c591290feeadb", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive4.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", - "similarity_id": "e25ef56461f4cfc4a35f0bfb833300a6b67317f44ed74b36b597a0a069155801", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "3a1b1207c276b30a6b7dd204dd92d69b1a6b6dc360a2bc516b0fc2f96ce6603b", - "line": 124, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", - "similarity_id": "0e5f5dd251a8c4c3c1eed56f38e05c74fc467fdc5f3f6951c808d24816742558", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "8dec0ddfec290c778497e7abc4bdede17380ae014503cd7dcc68229324b5b892", - "line": 49, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.allow-public-outbound-nacl.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", - "similarity_id": "a67ad7d78f629f07e1883705e58ae8599c0376aefd83a665523fff1b6bd93119", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", - "similarity_id": "3e3a29ad1782acf9bfd81cd185feb55c1c151144734532dc55c48cd7c25ba244", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.postive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf", - "similarity_id": "5ac7bf30867e4d4a7abeb2e3c7ad1ff8d5f3f730455335907c3e6e80107f78b5", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", - "similarity_id": "0ea51b51a68437d9d04828db1aa144a786086a8fbe7dc7a0d274d4937d8c419b", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", - "similarity_id": "884fb8990831f55c09a918fdb3d80800b4920c806cc516368ee744f8ba111bc3", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "8aba5bc0efbd23ba8aea9c60850cdaeb3a835123c19afef0b92654d8ea5a7a75", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_role.lambda-role", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'lambda-role' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf", - "similarity_id": "35fa9c039f38a765fb4e599851cbe9a51b8a909e4c2181641354650b745196ce", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf", - "similarity_id": "7cd7b030b965ca46dfd68eed2aa656bf75941c7939c351d76727e4bf00d38b99", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "244c45d2cc5700749a37d9782668fbe9a1ea07ffcea1b8086f976ebe3a69c1db", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public-subnet.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "51e0b91b0ae5c7b2ba55f6e9126c084cd7c3324b703255d7f771e392ac97b868", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "b07ba524b51265ff7600fedc1edb1a62679b99a9dedcd14c024615068529ee0e", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "971ba337f9f2288085c8606f33a7efa94188e3494d0228849fc1a539d16bbc09", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", - "similarity_id": "8385903249e281686df8366beb1be4071322a2fbfabcc8eceb8698d2ab49b5fa", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "fe5e3fffe0d67985688482b99a3a6a0b27920abfc40276a69a39bcd6244e7f5d", - "line": 125, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", - "similarity_id": "51fdfb929f1945c31ec986b2efe7899f71788fd143e1533186b2de6820fb090b", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", - "similarity_id": "b0f97b8b5bea6a929c0ca131bf038f85754c671a3b7ce546c0b8de26a1670350", - "line": 44, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf", - "similarity_id": "1429f2b9c1ae90284653f0fc6fd8a5f5be7c4ec53a93c0306411d9fd74ead226", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative2.tf", - "similarity_id": "f8b2a8c00f824b0ddeae1b8fc9e6f4de23c7bce93b7939810691f29318d97fe3", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "module.vote_service_sg.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "16f99359b3c70bffb8ff5da882861157798754723126d753896f61f1e5b2e62b", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "346acd27d0cbb20747438450da05d5534958b1f1a2e09e2f16b60eeaa2fc41be", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf", - "similarity_id": "3bd234eb3fac4a5dc78db03314aff25acae0343da7ad35056d4990dac296f420", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", - "similarity_id": "929f970c8183dd2f80758778ce519f3f1fb1ffc2f7d5e76c801fc8c91902df4e", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", - "similarity_id": "69bca9cd4301fad25737f3fd31ec40cd41e067663f8ef19345c5cff39fcc9b63", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "755bdf17246e6570114eab6bf577ca6f70906cbb734bcf94b58c65de0a40abdc", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", - "similarity_id": "348251ceddf3a5d54a2adcaba310895ff1bf9f065e6fbedc0197410524b59021", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", - "similarity_id": "f0ebd8c0a709baa5e15cdd44ac726a37c823c2d9b3c216590af17a92c8aa3bf9", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "a26bac5a4a656b1b93f8504926dca938589e6deaccf955c507fa328056f160db", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private-subnet", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-subnet' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "96f546c328b671362308c95eb60a5058f658aa783a826fa0886030f9cacd7853", - "line": 154, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", - "similarity_id": "85bd9583cd68b68ba4c4e1d02d691450fd67ff1205b28cf5fd0514599fcc3281", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", - "similarity_id": "17d941f780e9b573a11195a1486e4442632d4f6316f66bcfe4fa6cbeb6ee929a", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "2aa7d3da65a556a6f83955b30c3dc39b8f4a19039f62ceace153891e326ca553", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf", - "similarity_id": "3e9790f01ef4a507bf67628892de9bbe569f54a13b61988d7698d684005ad4ac", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "dceab47076ce6cc729e99044b4f4058afbe381bd12903408f18b52d1e825708d", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", - "similarity_id": "e8925e812be454f72e8414c984a7069d01708911ba789b1a397e2388f6513735", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "b839bf4dd2a0ba1972a53ac741044af0c29f0b2bb284e42140835f174c40672f", - "line": 103, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sqs_queue.test-queue", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'test-queue' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", - "similarity_id": "c01cdfc16065f5afc95f76a609b5abb14234662b6c31f4bc4465f42d461c4ca8", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", - "similarity_id": "de4c6414194955b94a08151b094ba30deeeebb73f2baa4e43c0171ce0fce91c1", - "line": 34, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "4284323071233b6bc105046bd70d89a5366894f21eb165bccfa7ca671a2e3100", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "b342c95db84b35265b809be3ce99c8f2476be9cb1ba5e6a5feb378e06cc5cca5", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", - "similarity_id": "a9ae1578fdc440251309f785aa6d04323bde53c17eaf0aeb6e40c111abc2ed4c", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.monitoring_positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf", - "similarity_id": "6e85544bf3ca1733a04cd0193415955b56352017c4a6c546085ecfa324410395", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", - "similarity_id": "49b711336aaef0a47a4f83e67b8a9ac43dd97a6b679b3ad5b2711edab751f593", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", - "similarity_id": "36ec454eb71fbafe09b93c9182ac449fcbc4365146bacd601f5e3ab4660ccccd", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", - "similarity_id": "73f8331c923c1a1cdbe7ed7c487277eef1535331a3a0dbad669bbaecfa396d3d", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "42f20fa8af421ac9a575c2291a3f76e5dea2b8bc9d14521986495b31812ba6ed", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'dynamodb-vpce-gw2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "7412bc25b1411dc579ff7c4a7f1e1076e2968b2ca2e0db59d0d8c53ce732ded1", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive4.tf", - "similarity_id": "08f04d68018af2808b97ebddc74e895cb7e1658fac24d700ead7c92deb09f847", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example_4.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", - "similarity_id": "4a083d8a09cbca91dc31b3e1a878c008783b6ac4b5407f4bc74127e3728a0153", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", - "similarity_id": "1e5d2a7cc5e055cbc2c99fbff96c21c4057b0ffa2eda8b30b7b3ff27d351fdbc", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf", - "similarity_id": "77200d3ae45d1f5673f4dfd85e3e364b5e70bc755fff5ac7b649e5ba663ecbdc", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", - "similarity_id": "96cc8f06f61f64abcb6d7b2c350570ee1d2cba2e13ead36e95cfa65ee3c30239", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "a308857f8fd065d1aaf0db41d4fbbd787610cbdb4b96f0212f4a49b5a72fa91b", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf", - "similarity_id": "a4713dc5892d94918e91444a433f9f1faf7b88d8f2817a5965f99c28a828f7bc", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sagemaker_endpoint_configuration.positive.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf", - "similarity_id": "42c375462901ff2a45815aa7fafc5b05ee32f5742a4fb680736d7ab2fa849126", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_api_gateway_method.positive1.request_parameters.method.request.path.proxy", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'method.request.path.proxy' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", - "similarity_id": "453c396ff120e84c690b7be23e2cb7453adbe7f4c0c1c79a042a68e9b3f84033", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", - "similarity_id": "6bd0ee3ebd17cf08cd00ee69b6dbd56dd4fe3ca4ac5b410bd69ef827513c58db", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", - "similarity_id": "2fe696dd55f03e7f8eef154ec5dde099f469d4cef4d83aa0ba7ffb102957b930", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.positive.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "eb5533df2f2a12148cfcf4ad3f10fa62e9d7de62883c8c2e31803f998bff426a", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf", - "similarity_id": "db6e59040382216283edb5e53eee761aa2b841070ffbad1debfd107fef0d6f8e", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_alb.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", - "similarity_id": "27fed3a9156d4654e316ecd8873a367b7bd9cc1294d0bc3113efcdb7d0ccdbd6", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf", - "similarity_id": "ad96a9969928025164d56f62846468d03f99b04c1eb41b1626a05fc418cf26b8", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "59cec616e1a18b2395a5e78e82ac4fb26750e4dd9853b5e0b856dcf3c6770fd3", - "line": 74, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", - "similarity_id": "f1111e12ee7ed489204e3d10866de884356279e3073b3c9e6199babd2ac241b9", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive1.tf", - "similarity_id": "e78609b6fd0e71425961507ed22ed0cc850652d346edaba272be5d8b7b1cf572", - "line": 3, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_default_vpc.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "939c7406aa1510363b522b666a0099468cb172bf316427f5043ce26ef81ee1dd", - "line": 26, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private-rtb2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "0c4f3a5317ce6167a485c731606c043ee492c70861f8848d44e641fc0f84d2c2", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private-subnet.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "3bf42280dae049b4ae42514be9f750073894d04fa8692ce47acfe8dac8078ff7", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "bd52d6975ec405299356bf36a5a8bdece691750c1d88623230ba3e3303055d64", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive8.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "63b0ef5062829e4b428e2a2b7da8179ae776e04cf6c4bf29a9a775fb039aead8", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.b2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive2.tf", - "similarity_id": "c06ba30eb2aacd28485fb9992d9ecb4f8961be2f0e96921cd6a460535c696c62", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.positive2.tags.Domain", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Domain' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", - "similarity_id": "98d6b534947abc0a21005acecda6c0cc7e92eb911eabd37c1dcb60d31ec942f8", - "line": 52, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_kinesis_stream.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "a38369fb3a5355b6d831c0729b74eeb92cbed9a8c4af110c072bf27da6bbc6d2", - "line": 43, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", - "similarity_id": "c39b340b17d328ab3523f92110d71395356a8b5a699bd72656748be0a5f988c5", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", - "similarity_id": "7d3196b48567e3cdf8b843b452ca3497ab68f4c79d7021d3b3f1691e1cd6bfef", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", - "similarity_id": "8ed2747a543bc26a6c11be518a9ae865f90f79105d163bcf811dee88ba878120", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'sqs-vpc-endpoint2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", - "similarity_id": "cedb60c696961f34adece5afa6d71abd2afa0efab87d411dcee08ed57f8191be", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/negative1.tf", - "similarity_id": "7471ac636235974240303c5f89cc2a22eda718f926e99987a631bcebd84b4361", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", - "similarity_id": "ea50dd827806f9b9941dfe91709dac6daa64479f8590e3053d210762e1cbfb1d", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf", - "similarity_id": "2079cf232e99edca125015d3625bf4a553a4c6bfad58170aa11279a30e8710c0", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "3998381bbfece72857c646ffb615364f55ea6b5e628ffb41bea3ed4765f39693", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive9.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "3cbe90a5e5f9d7fca04c276c741668fab16371041e47ea0b6328b1600a92c7c8", - "line": 155, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "a552fa828e5b13220844efa1dc9af2bba6a16879202d7927040cb8b457132d12", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow-public-outbound-sg", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'allow-public-outbound-sg' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", - "similarity_id": "e24abf92d3904ea6f742530c02085c6ce6a0185c07848524da4bfbf02cb3566e", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", - "similarity_id": "77e497e76926f3c56e14c4d48ce0edb19a02c018899fb690f212dcb8e4b7a968", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf", - "similarity_id": "4e8832d61f3c8220a4678ad6a81cf6bb30d7c69aef032e3b5aca411659893858", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf", - "similarity_id": "c2b2a8ade073d489fc064d81d2a7f2b1a0a4e162514d402f06479ff95b7de8a4", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf", - "similarity_id": "59dd7e32da16aa09a18c6df71a4cf20b73699642f07f82c99aa263bde8bf7b68", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "031881bb4492874b6300913defab119f3370236355f55b243d89e154617d2efb", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "83432e2c53c8b9aeadd40dd82ed778d4f1daab01329bfae29d31d29a423f2e67", - "line": 90, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "33dbe35137e6431cd5f9fa9a0d11e8404bf7aae935c280620d090a71a1263cd1", - "line": 62, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "4f2d8819a20263f5792b87febff1219b6cf2c97ede516d69a4ebc52ae7b4d68c", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_public_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "e174a63f98947437c39f4708be33e855c67f03ebde8ee5c3c0c935d5d7eb3b71", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "4ebf726cf97dbfbbb362264bce2629bd8e7c003bc2deda0c6fc721c723b37755", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "output.kubeconfig-certificate-authority-data", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "85bca752ac9b3b8ccad0f9f993e91172a5f7a2d7763979244db0dc2634280a75", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "cfdd3a66d4359735adbe4e444fbe5c4f4aa76540f26571192fe46b4f057fe0c0", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "819242a879b899ffa0cee9555afed26f2a0f1a183bd676b0351c05ae0d393569", - "line": 43, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "110dfbd065a4ea1384a903320ec95e2ed11393caa041b1c1363dde526c809856", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "09fc4b59a9f4ec84ddcffa8ef6d1fdf932733645427629ef3f0555a3252b1b04", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table_association.public-rtb-assoc", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-rtb-assoc' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "4424916e57155cc434cbb9af97eaab909cae02db12a80a0d118450e056bd8998", - "line": 139, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf", - "similarity_id": "f9ab8774cbbd640225ff179f967078c17cb2ce068f2cacb9bbffe85fd7dbf6af", - "line": 56, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", - "similarity_id": "17ac669dc753a0e818e40cf12fd235f6b5ada51ddb280cfe6d1c47ba6fd0b568", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "5f660ebe2a3f7af747379cb7eb4d15532dfddc9bf6b2a0046c379642e96f448f", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf", - "similarity_id": "e74af1af9a679cdab3fa52406dcc1eccd79ca59fd5237bcb3097bb1915ea8d45", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", - "similarity_id": "fb284e794fe6cff0fb65c8e5b25d8f724bc6ace9184fa1dc21219893f8ca2a99", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", - "similarity_id": "83da13b1e64eeb5cfde9ee9183bd9bf573e3fc42ac4a4e716378dc54de63dffc", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf", - "similarity_id": "c869335e626d8f4a83f67d88fad992441847984c9bffaaac14b15e5cb6bfda51", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", - "similarity_id": "e5dfa07a43773831c06c73bd233327d02f2d8500d00f3cba3d10e124c8af1967", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "435517ebf7098a7a6591e655cdd0edaf087dce1b88ae05bc096135c53f918dc7", - "line": 43, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "c5e3ae193b2c7d65ef6f79dd8b7133c77552dedf207b57b2ac2bd3452378abe7", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "4b24f1a5117b3c47e61bfe514fcc00fdeb17f2a2031530a147562f2d9604e3aa", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", - "similarity_id": "c471f89017099d6958b0b2a006546532a831e5916271d4a3317303d089411d29", - "line": 34, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf", - "similarity_id": "82b9d5d6f8774514a9bc79232b257f0e1def4fe06ad5c4a28a876d8e4c260cf3", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f9de5332b5607f47780cd9e30670a59f641cf80272781596dabb777799f8bf07", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "b5a7fd1c89f081acfe52b3c65c39e44cdfef3be4b49dde0b4f0140c057f12cd5", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative1.tf", - "similarity_id": "f69206dc3763f31f1af04ea36ad378b0b825fff61897dabe0bbbcf7558009942", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_alb.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "9c09b17284594759e4e1cbeadb205ea4d49c35d4a9a9b2dfa0291c7fc3e81778", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "943e0501da7e97693706e63f68cb49a37623da64e1997f9987f8b13be49635f3", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "a887f56cab3b06540997b3f969cca6a3cf3653b17589e58eae01e37a9423b51f", - "line": 138, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "575699d258d9c5b53d96bdc04f862d87d90ecabb8be3b2a95a68ea9175c8f16d", - "line": 83, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "f21ca8b17304dd763898d05c3c3d8b841ccb4e03ea45cf667bf8dc8fe2c86917", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "b2aed6f29d22ec9c89b7d0987ebe324bf8a5c1663a315abb9f970197e871ff60", - "line": 72, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf", - "similarity_id": "09b99e9bd1aa7f95998ecdd1816d5594381f2e741258e1ca25b0d4621dabb40a", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf", - "similarity_id": "c48d35cce6fc791666e9872dbed0e75b16496f13b13c8e1fe1ef67594a08e548", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.not_secure.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf", - "similarity_id": "7c06cce6aa5bf47817df325e8d30c5a41bb563743a46fe3f93a5ebcaad42ddca", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf", - "similarity_id": "1d76d23dcd7f40f017b220838a13877514708e1cae2cd0aaa1a96495d45444dc", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf", - "similarity_id": "f1e2d7018aa155626aee03ff60b590ddc43a0c8c01f0cdf50415fc46d3e844d2", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", - "similarity_id": "6308f1c09f4f1a2c49080694884616307445d0c83e8fb726e7ad68d3daac635f", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf", - "similarity_id": "b2e93d03d485c97fe0358d969b678a10d865edb9d0e9770d6d4c06aaee099251", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "e3a8d019d0604242fee6fddcc6f020a29d14a5c0e1b4b3e06af77b0283ffa291", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf", - "similarity_id": "8c0d2e89ea9a32d6b2bd9779aa116fa16ba3fa41b128c9870ad2f1f437e5513b", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "dce0c3ce51368c2d8224c0e3015d11bf6475f10393805d6f8c5e609062b8364d", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", - "similarity_id": "1c9145864f61e02bf7358770b06b5656caa7f32c7e60c300c5204116777c44e1", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "7978545e23d34636cf7fd8cb04ac08190761afc582619c16eff2517c8ba78e73", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "c4906d9d9e48b34bdcb435bb4998a0e5bf4d701a76299abb96ed1861ee3d0eee", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Root_Account_Use_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Root_Account_Use_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "f1da668d4d068beec42ab936262ed8c20a7f05969713cba47459e79a1dc26579", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf", - "similarity_id": "8f1347c3e9ee906de14af43028242063eff022d83ec30116354cf5053b855287", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "9ed4a0099ae03998c9c9f68a17f062556c958831102604f9bc571d0cd77e5e33", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "b0fce6713d19a762fc0dbb3c8d60b93061877a82004e9ef673abc190b4296e8f", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", - "similarity_id": "fdfbe5f1dc4c40874ed0afb62780c9c24aba28c4ab26e963d8fdae62c3d0b5e7", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", - "similarity_id": "9614f8f17fcffbd9f4fe2c135b70ed432f0989336d222fe098d9a38d9c07954b", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "caa26eadde0c2a8a18c028b530c37f8ba29d24236f55fcb5189e1f4fd161502a", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf", - "similarity_id": "69a8129bf9c3027161520db6e269babe57bcacc1b326c22f11519cbf7b679536", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", - "similarity_id": "63f9dd457a62cccc5575b12755a0bb040dea11999f0e2e591218bde4c5331a74", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "ba94335c337eadb74fd88c73d332b0697d4f468cdfa5782c0adb4079ddd18545", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "a08c0d8514692799d1ca77e755dc9cc5d9b3a9ce3cbcc47a5ce7c5b00ff3464f", - "line": 104, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudfront_distribution.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", - "similarity_id": "d78ead0ef2f3187e592e934a20987acbfd502d94c3870fef6048c950cc5358cf", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf", - "similarity_id": "57539d55fd7928bc7812965c11a25666dc1ecf67ab045e79593eadc684dca803", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "d6be5cf2a7b8e7af547d08fe450f13d708341d129a49541f4162793402152fb7", - "line": 74, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf", - "similarity_id": "ef717a745662f6b7af47dada20523a417c9bdc77e39001cfa4e4432d27bad4e7", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/negative.tf", - "similarity_id": "17c379f004bf49cdc2b697667e079fdcd71502410b5406fef85530c5ca66ec99", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_role.negative1.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", - "similarity_id": "e21402fe5c2421b651e2e42826eb7e5e3e2c5277a6bd3d3580eda1e73f8f9773", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "9d5ccf4a45e6116f4848841015e4685aa7c099132d5917874f6a4d7650a69274", - "line": 119, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf", - "similarity_id": "d1e86ab3ab02b04d771934fabb03d968c9a0b2288858a4df7b2c026dd6a81d91", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "411772c66dbcf4b8153d6328b2933bcd5bc69a06576c5d14a805ad94bce7265b", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.allow-public-outbound-nacl", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'allow-public-outbound-nacl' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "4aaf805eec7747d7105dc9f24d56696159d71046f8e42aa093995eb99ba37458", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public-rtb.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "2daa3b1ad23ebbd0374fe99a1dc7b9e0253f02af5669ba87db6645da74122030", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "58ac15137abcfd8fd8c93877632f209ee2f1083c18cd921d40b1f47086674a51", - "line": 49, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_policy_attachment.test-attach", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'test-attach' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "5c245006fec121466fa24e2c8f0af2eed5c6f741a9f7539f9706c861506d7f4d", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private-subnet2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf", - "similarity_id": "48f8684c9a856db56f1e2bc7be347dee89fdde3bb0db344c633f296632d5fe29", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf", - "similarity_id": "063674bbee29646ef1b3796731800f024b3ded6e818a327f51392845cd048a21", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", - "similarity_id": "7278ea934f5b3a38ecef69a14e586ac1fc23033f8172ccf1c4de807c42dae6a1", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", - "similarity_id": "dd216d3f43ee7645670a1a2a52d26ab2d820575712efbbf08e43917b8f8dc4b3", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - } - ] - }, - { - "query_name": "Neptune Logging Is Disabled", - "query_id": "45cff7b6-3b80-40c1-ba7b-2cf480678bb8", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/neptune_cluster#enable_cloudwatch_logs_exports", - "severity": "INFO", - "platform": "Terraform", - "category": "Observability", - "description": "Neptune logging should be enabled", - "description_id": "eb6f1a3b", - "files": [ - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf", - "similarity_id": "1c0405bb165c729dbcf6a049168924129e957282b780ae14cec0a77c49e669e9", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_neptune_cluster[{{postive2}}].enable_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is empty" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "74b61a0248f5b1c22247d01095ef54452124c2d50ad0fc31c2509e2ed56006d8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "f2e76817dd9d5dd5f97d09929c81be2730475ce362b5a3414ec2121f7d9193bb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf", - "similarity_id": "b0a23be2719bf75e259cec51212498cc32119c416b87a38465fdf426432db289", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_neptune_cluster[{{postive3}}].enable_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports has the following missing values: audit" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", - "similarity_id": "2ffbb813e704578d0874665cd6275152316b23245a361dc53f27963f8d612472", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf", - "similarity_id": "3e21e261fb043b2d6fff900f0d25312e83e37cace0f03ff7a2eb19dfc496e771", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{postive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", - "similarity_id": "a82929c622f9b84eed8cad39c223778026781554a4db8262faae485aebf9a049", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf", - "similarity_id": "3baf10ca64b00814879bfd985fd3f54c7bd7b55d8e0d3a631281caf2ba9d3065", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "7ef86c307b58cb6cd56444c65571ce0c96cbe0d814bc0c1566a734cf37e20c76", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - } - ] - }, - { - "query_name": "Output Without Description", - "query_id": "59312e8a-a64e-41e7-a252-618533dd1ea8", - "query_url": "https://www.terraform.io/docs/language/values/outputs.html#description-output-value-documentation", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "All outputs should contain a valid description.", - "description_id": "81535d16", - "files": [ - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "4fc7c041f58201f74de9e2bea1d2b12a94fa574fdf1c7f8979dea8fd9ec2fd5d", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "output.{{kubeconfig-certificate-authority-data}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", - "similarity_id": "af33bc55f0f3d18bbb1363e1e83c3c8c34f4ef4ed4523c388a7951c8db38ba03", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "db8ed9060a44bd2205a3542a0804a07248115b98f18cbf7467679b91fb78ec82", - "line": 43, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "06956b3babe23ecc1f80146332881287afee675a20d22a3b382f5c6fd70986e7", - "line": 43, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "cb2f8c556cbd43cd976b190bd8ae3e09d4142a923ef7cc73d4ac94cd19d6f2d4", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "output.{{endpoint}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "80a8e4f10d12f6b39d600bcd8c9adc0ccbd8285c063c57729c0ab20608801e7f", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "30428d93436ac9002bddddd66aebd9318bd538b5b7f4b233db0259ffba51d3f9", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "92a9771d91987231734d620433931239d578250ccac0b96ebf0e838e08be04ef", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "output.{{kubeconfig-certificate-authority-data}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", - "similarity_id": "95be5a87221ee7f9b4a91b2f615e53de707298ea43d5e6a4504c4f8a40cca308", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "e2aff156d721fd96ccea417a09049f1682e09dfe17034402412ddc62b5e33edc", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "output.{{endpoint}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "8b9276533071393939dd994292c0c5946e4d0223df6a424b2fd4b44aeeeefd8b", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", - "similarity_id": "d8b9aae21ce6e4a1861e29548946e0d9772b2d374b643867ba1b7b9f6c4eaf81", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "7b8df4fc3d84b48b856c6fa43b6b73d0e784f325e598cfc925da2fa72c731a62", - "line": 43, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "f7a65411846649dd32cbe30226bf159b8d741db535ac4860f1fae09e79a42f55", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "output.{{endpoint}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "e178d35cc297562df7f46110548b666df08d7dcfc246246cf8497c0355be3432", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "output.{{endpoint}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "a653c6311fd684bd2461ef1338637585d123094578fb3547c906d991348f367a", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", - "similarity_id": "9ad5ea584de1abb57833710cdd574a16b7c71e326c60bee3c068ade6c68cf2cc", - "line": 42, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "d3954dc0a3f748ade565c4dd77e0bd4b68d2b5784dcad49202c866a8fbad528f", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "output.{{kubeconfig-certificate-authority-data}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", - "similarity_id": "3216bfe89f9bf5ab2a4351a59e1addeee0bdc97d7a5d87ca6f239e23644c4b71", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "ce94234d145740edc20e7e0889b5cdd28fa626f979d909b416f8a76fd8323377", - "line": 43, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "85b64fffeb3d57265b2304fa679c516310979eca96aaa8a60978af8a7c388040", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "output.{{kubeconfig-certificate-authority-data}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - } - ] - }, - { - "query_name": "RDS Without Logging", - "query_id": "8d7f7b8c-6c7c-40f8-baa6-62006c6c7b56", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/db_instance#enabled_cloudwatch_logs_exports", - "severity": "INFO", - "platform": "Terraform", - "category": "Observability", - "description": "RDS does not have any kind of logger", - "description_id": "c499a58c", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", - "similarity_id": "fae9533d0141a1f5f27c25c3d989d3cc13e9247278f763de1847ed01a13b4eaf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", - "similarity_id": "9b2222c63cbd7b17ca8bf7a2b6f258a250066e38065e9ea6c5b905cc705088f8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", - "similarity_id": "d27a4c30e24efdc30d70bc68deff163ec44739d827e984586b7e88d3f6d3fdda", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf", - "similarity_id": "6008d8166b4e4cd74c3985797ce6373bc8d1471693d45c32a65d64bdb9a9595e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", - "similarity_id": "b0bb0c256dad02137198610fc00c38c264ec1fbd9cc9fb815818d7a72fe88a3a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf", - "similarity_id": "c345799c7b93cdd832f5c493ba89d1b6d318753a382d479d36cf6f373637723e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", - "similarity_id": "c7f051a2a11d5293c0458b5bc4b93b7cca93f05fe75ed270dd3ae9e88190b74b", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf", - "similarity_id": "0560239b87e7432a7473e4a7a6434692e6438112029299dfcce2477dc1300db3", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", - "similarity_id": "450de690194a193ff6ec9bd92a5cd9d638c16d9a2ee73d4ddb5172cce2be38cc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf", - "similarity_id": "ae161e836a9425e161ed99953924cef014718b78c5fcca63106c89e8610075bf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", - "similarity_id": "ea9ab37a6e126a1cc7c1e64c3e7d1dcdadb31910f0fadace6521e763d11d1fe5", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf", - "similarity_id": "2099960e139454a018ec5237b0837cf7de6431757cd0bdfce4f841d99f6a90b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf", - "similarity_id": "44a5d3a6e9aa75c08d153dd96bde323c36e157fdc833ea6cc29a028edafe1f13", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", - "similarity_id": "b17f557d3a41f534d9d9693c5678a67c049d0a75cd9dc4f3f14996a123792d8a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", - "similarity_id": "32e011d1ce59c6be9a1ff8cbef5aa13189167cf640c8df575c8f07a90bf3dea3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf", - "similarity_id": "0d27962ca3ad069e9a43cc4a8d226f224af24b06fe21b731a71cd0cd61a88461", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", - "similarity_id": "76f3ae2fbb71026388ae30f9c3ff5b059e91ae1eb7895bc0ee2973345043343f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", - "similarity_id": "6b236bb26377e8d80d11b922261bdcdc88b145f556179ade9581a091bf9bb298", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", - "similarity_id": "4b341d00fef50044bc30e53de85bdb9f8f224d6600486b02b2801cc1c9c88d79", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf", - "similarity_id": "ab4ea2b0f47883fcc21ca20ce3eae27404ee77d8bf651d6638179fb647cbe139", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", - "similarity_id": "d7edee056023452965f5799cebf6b8f1b354a2040c1c0689acda84728ade7a14", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf", - "similarity_id": "ecdcdf6a885aca6c1a6955efad12c83ee0d5eb4b3474ceb4480f1b344086cc07", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf", - "similarity_id": "da2f5c78ef84808e50853093225d89b765ed3b2c37321ed8bd063393ec2bb9eb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", - "similarity_id": "389fff0ebe63dcb2fc3d4cef5dfd627cb8b3dc521adbe40488b3a4b1d8985661", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", - "similarity_id": "7841895e49f3865411fe6cb8d454f699e8abf396abc62301ba78c340a7de9752", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", - "similarity_id": "5751bb7505921720f1e5b0603c610469123896384d83ebead2158ddc6cbc822b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", - "similarity_id": "3883937a795b21efeb982e2777e42c758a93e962f5ce6f1317a6c4e2fc5a37f0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", - "similarity_id": "08d252bfb9ef37dc1b10148b413edef594a396479ea5384e38cb6d7b6d2a76ad", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf", - "similarity_id": "f3db60a0220d043c2456a96839f74e3937429194b44d3cbee25a8117f133c9bd", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_db_instance[positive2].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' has one or more values", - "actual_value": "'enabled_cloudwatch_logs_exports' is empty" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf", - "similarity_id": "03b5c7234d8c9806924fd3f2e6d3258543178da27008ab0258246f78a335b56b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", - "similarity_id": "b12ed983003cbe29dd0ab54b1726cc1ee8db5c05244a78206d8ce47232fc7e7e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", - "similarity_id": "0131772231b2e7354f3328fd1a1b466964e8182f548dc68b6ce6ec311f868258", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", - "similarity_id": "d641947cb6edd7684192a90891b098ff9d283f0213909a6bea1c040f540c8233", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", - "similarity_id": "2f600b61cc9f99c4fcbb6eaaf4262a918103754a4858836398f18184eb4e150d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", - "similarity_id": "70f32821ed3dc3b831fe2dab5b4c818df3392c3f08d1d36c13e21f85e3d9ab28", - "line": 11, - "issue_type": "IncorrectValue", - "search_key": "module[db].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' has one or more values", - "actual_value": "'enabled_cloudwatch_logs_exports' is empty" - } - ] - }, - { - "query_name": "Resource Not Using Tags", - "query_id": "e38a8e0a-b88b-4902-b3fe-b0fcb17d5c10", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/guides/resource-tagging", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "AWS services resource tags are an essential part of managing components", - "description_id": "09db2d52", - "files": [ - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", - "similarity_id": "7e02e8b9c0dad3c4fcbab64886412a41ec2069f79f82b3174a452d175f999008", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "83b2ee7077c3c1c5eedecf44c2289d7872710dc6b780112f7c1eb7a5e692d21b", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/negative1.tf", - "similarity_id": "8ca9b71db695394745d2d2b7d8a79ceb249996d8756bd7449e3c41d7896d0fe6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{postgresql}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative2.tf", - "similarity_id": "ca9ef761f3ec26ccb07d14bd4237e954ad0a4009667ebf0c94ab2f18931057a1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{negative2}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive2.tf", - "similarity_id": "2ead60d89418bd040d676dd9b82c091ebf187d0e3b57abcf94d97e1dce441e69", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf", - "similarity_id": "e07d18b15798e084cae85eb808b161b015d33d364a3c2267eb2a4cc92a5e862c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/negative.tf", - "similarity_id": "e2530a639493c42cd482b59c112fafdc91e90c62f1dbe0784db6afb4c56f19c8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "ba0f53d25ae87f5895a00fa8254dd9778783a90c0bd1f68e47b62b4bd7097eae", - "line": 93, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", - "similarity_id": "e26bae590f859e175790269f07fc770a22df0007302d44e14bee7e00883b8819", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf", - "similarity_id": "2a3ab4cecdcbd321696eaf03a9057c2625a1f6df278105667157ae7b31ff8721", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf", - "similarity_id": "4c900b48aab13fd27a83389d1c28863c1db6541fcd3eea23b085545e762ec7b7", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf", - "similarity_id": "a8a666752449204c1d7a68b54ad35ddee8c557877f99db7f692c57f469a71455", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive2.tf", - "similarity_id": "506fab471e61b74698da6047c53258782ecc95522b8814d115abb4de9c092735", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{test}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "ea20b106920a54c26d8511e0d6c14280d34dea902914b3ca9ab661c25c9276c1", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_route_table[{{private-rtb2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route_table[{{private-rtb2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_route_table[{{private-rtb2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "846840191ca1916ab5a63b75f11a0dc52ebe4722aab0b2a11ff4697240bfcc1a", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{test_role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/negative1.tf", - "similarity_id": "1b3324f7c94b6dede2dcbbac6b3e1c9b082bb215f099825d697b3a460c189d47", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf", - "similarity_id": "b3862e7d41f123f8eaedb4e8043366cf026b859163fdf23752a2b9ee65337849", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", - "similarity_id": "1b69624c85d46670f4e61905714b5965759435d27ffe23b82287950fa86e5dcb", - "line": 34, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{postive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{postive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{postive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "5a1da4e5ebd82f085d5063a928de0bc78c30cf758b48ccc633187fb8615eaa87", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{vpc1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null", - "actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/negative1.tf", - "similarity_id": "45c14ed492322458ff3e44a37a19979c70049fc035e8023faaa4c613f4e07525", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dax_cluster[{{bar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dax_cluster[{{bar}}].tags is defined and not null", - "actual_value": "aws_dax_cluster[{{bar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/negative.tf", - "similarity_id": "7165497ae13105fd68db3206c5be60e34c0818b7dc65ce7e34827c7a1b9c89bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", - "similarity_id": "00c83f43543c3c7a77d330dc5c9f986a2b9dfdd513ea21785539da20a02411a6", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/positive.tf", - "similarity_id": "a68e17569ce907a9f53029de09e80e04d7576907afab4e1012b6c749605e4131", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "1a053758462b24cffe82cf6b2d79df4806f7bfe255a1a445edcf635dd28b291e", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_usage_plan[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null", - "actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/negative1.tf", - "similarity_id": "4f79e64c87465132270cea917f66a41d224491c3c0569f455312dde04c85e0d9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "288628148c1dd8a1ba828981f1ec7e85e8d4a1351d55515a5f860d2f58499274", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "e18137ffdb26d7ead65d13b9248fb09e2b0b6c7e25b4b8647d9ffdc18f5507c9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf", - "similarity_id": "47ab5a5a4c2c84ca1706eea63347914963e30d926b97dc98c4c7d77d3f19d605", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf", - "similarity_id": "2c9d8ab0af1a1109813eabceefc41829b6044967357f654709650c51995c47fb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf", - "similarity_id": "52ec09e42c16a3fb9cf0e75889765c16df350632a2f0383fa1ad09b94e762a52", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "412c119c5698f2fb69bb4dc1628d124c788d0d56bbcec2bc94ea0ff1688dd0ba", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", - "similarity_id": "47923349ae643b9f667e24b018908eaa66751e657c646db0d98bb7b72b0999cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "fb0a937ddde6135ea46b356b1e9a1104eda37601027dbbb488fa80b174c5745d", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", - "similarity_id": "0c27c87a464242ba6ae0ada50437f591c69d99bfedfa8e54883ad8a867f7d540", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", - "similarity_id": "c7aa5bbd271945c843a80f889225b0c52a537143d7d8f61b8a4061b231a670fc", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "0e6741250342a3e4853e5bb37010d5dcd3549e26acbde99a3c758b83637be06e", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf", - "similarity_id": "69088c805e052e8828b9f8a7c5da05cdefba03279e82e831bc6dcab5d70f89b4", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", - "similarity_id": "707ab051388c646536fcfae6489c6d71ac44d197f4dd52245c1df977d66979cf", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive3}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "27e45e9167f5af6eae42515c25a31c4dc8656fff744ccdb0ff081b8240b84726", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test}}].tags is defined and not null", - "actual_value": "aws_lb[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", - "similarity_id": "f1d23607f865826e68c1891350de06f695e09df1dc6723d7b4161fb7a64b08b1", - "line": 33, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{positive3}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive2.tf", - "similarity_id": "b201960db9397f12bafc7d0e0cfa575ef954cee092768f2675de7cb1b8d4b42a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive2}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "ef4bfdeaf2c14b75184e4f5f0fd9d6606770016aed273b1e58d343750ebd3025", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", - "similarity_id": "261b3a6793d3a0d3357750aecf6f6db454a0e6c2e288d1a01568127a580bc3b1", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf", - "similarity_id": "c71b9036b628c802f4a033cbb3966fea4ae019a4ebc1af45513cc9f6c3f1f92b", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'", - "actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", - "similarity_id": "62212ce9e813a833d31ab11a2af38ce7f2967bed290134bd303d0033f3225d5e", - "line": 23, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "393ba58777cd068ff77d916d1e4ae16a325a482688d20c0ac922ab7e71b07a50", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_usage_plan[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null", - "actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "fe79e338d31195c85c51109d8fdc53894bb1b123d08323c4b9dded4692a4de2f", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "e531765773e296c5618ee9e4b10761c9ee2c7bcf6ddc7247fd6169089cd6bc00", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "2e26557e78f3f7955a5a031b7453454c52c59b0051c3f58b0fb80ca9dfd0fc4e", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "4af43f1b8061d91a858ed8034d17cd8a4d6a9d64ce50ac0eaeb2636b62529c55", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/negative.tf", - "similarity_id": "5afed49fc6a2915a402cc1fdb1b8379cb9f7cbec121e1469fa90c9be54981d5a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "fc5ed0e912505526f8a98a4a4e68c43c2b240982efbc64321f52bec10677cf7a", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", - "similarity_id": "7655a9b5b1a4bbdd4cec9c8ae584d8da55eeda37bf8af9d088051f87f575dbf3", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_ami[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ami[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ami[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/negative1.tf", - "similarity_id": "5e40ab8211a035efe849559bfaae1ee931356659f8325c61b22d53b9899dad16", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example4}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf", - "similarity_id": "a421b7589e0da6b62b605a35efef550989462f21c6a304f198ef7c672b7a084a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "f1cdbe8ea87c5bb5c00fbcd517b60c0d1509e0cff29131b8c5d6476de491cdf2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "eebda7e6c5c73313f77a57d81f80784ba28cdc5357c4e935444c1fdf52a861e3", - "line": 94, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is defined and not null", - "actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "8ef2d5c588f29eec85b7d577c725a35871e2a0fbcfc0db33ba8941a748140e92", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/positive.tf", - "similarity_id": "955e41d5d1d04786e98be69491b267366a92c7b8faa2c94e654f6f9c6e2623fd", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_service[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/negative1.tf", - "similarity_id": "d8a576c8572a4c4064a620647e262bd1ecfa49a1c5f76e4df785b2538013a662", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "43c204b5408fd3fd9c95009d665de20a7acabcacaed371c1b3b10e1c379b8470", - "line": 58, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow-public-outbound-sg2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/positive.tf", - "similarity_id": "f75f94d286cb29ce4f0d1683c20de3a202303b44d10a087c1915c7c18780cccc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "db1121dfe91d7df84a97592162b8a1b346a1c99233038f07dd188e94ff94720f", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", - "similarity_id": "cfca747d5adea55d9b316fa3e9005f25c6b6615183aa964378ee99fc39080d6f", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "d9cc822320dc4d9cd025a48c3823e953f0bf29a2a784c54140bd2805104204af", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{private-subnet2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{private-subnet2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{private-subnet2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "a44b1e99b912fa54138525e2863cb045b554de9bb5fbf4308756215d8fc1e9eb", - "line": 40, - "issue_type": "MissingAttribute", - "search_key": "aws_route_table[{{public-rtb}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route_table[{{public-rtb}}].tags has tags defined other than 'Name'", - "actual_value": "aws_route_table[{{public-rtb}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", - "similarity_id": "0e474fccfb992b7ae8f733abeb47ba2fccb83efe04464b77f33aff2ed270d53d", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_athena_workgroup[{{example_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_athena_workgroup[{{example_2}}].tags is defined and not null", - "actual_value": "aws_athena_workgroup[{{example_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "2f055d8c48923799a78012718c1fb4b21d7a0198e2f748e2b9369dca7c21ea4c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf", - "similarity_id": "fcd76071826d157edb744c53ef16f40ff397cea5b9e283bbb2f86ad2de56b13d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf", - "similarity_id": "491572e75aec5c4e850d6616b246a029bff75d543dd8a81702c4535d02b94570", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{positive3}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf", - "similarity_id": "5beb0a48d845e3d7c6aa0246ea1d1db1bb2183556200c445ef71fc80f66ac600", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{negative2}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf", - "similarity_id": "2ae7c0015e1872e779e77bfc6edb482cebdde59b619b226f7e4868c90c559ca1", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf", - "similarity_id": "90b653eca86352c80beb63c96a9b2c2815b17de563861e7b4dbdb292fcd30103", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "2018e63aa198b6b898b9703f6045024f897e119dc76773e679a86c05671a9220", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive1.tf", - "similarity_id": "507ac4927b22bab5cdbba3395b8d8b107704c83bcab157f8c4ff308f9903e666", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/negative1.tf", - "similarity_id": "cc755e3a6cb0faf3fc6959c7d075ee518ea28ec200bbd7dc78109380336e83df", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/positive.tf", - "similarity_id": "f3954aa3293229e6fcf1407295f8a41a2d56fed3893f7363b27c974a11c95cdf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_guardduty_detector[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_guardduty_detector[{{positive1}}].tags is defined and not null", - "actual_value": "aws_guardduty_detector[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", - "similarity_id": "07fc33d5175008f9223e68b689af7a106718429a840f17a62bf4640057a13fa4", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "b4e386561ea6c671889c98f64a8af5fd76420e78d7c80f4d6eee70e437b45907", - "line": 28, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "73ecb72ab2643b1a920380ff3d9323fe577f9fdf2974681b79dd3a92696d44f7", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "1c75034b7ec8992d154727cfcedadf30efc13ad205721cb03e07928272f5c788", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "ee0fd33604f16f32ac1a4f7b6facc70bffa69fb0efd010590c501334b14182bf", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "27a1ee8de2c849bda4a90fa7c02856b078131b29b083c04516a95c7e3dc66b29", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{pub_ins}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{pub_ins}}].tags is defined and not null", - "actual_value": "aws_instance[{{pub_ins}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "17ad9b83d7b4a3d06b5bb92405ece1ddbc134f5c7e1c1dd7e664391015d09e1e", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "a02625f1cedab8735b617b4585e26dc48465ee5de5ef1a69247de4a67f51206f", - "line": 44, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{subnet22}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{subnet22}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{subnet22}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "d26cf45284e13beba9999c830d57149c916133c65d0aa4ce69af33f933a66828", - "line": 48, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{allow-public-outbound-nacl}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf", - "similarity_id": "dca446c913eeb019748add566e8ddd8b512e99f4cdd83bcf9dd35f7705db22e2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", - "similarity_id": "d14870efa711607f8ac398d279fd5fdc0f489c66711d94e86ae1e246d2a8af7d", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/negative.tf", - "similarity_id": "637cf29e514551b89e42850770fdd6bcd4c8aaeb631c04b9623007335030d4a8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", - "similarity_id": "c52dfb2db823b18e0ddd8aa79bffbdd4c0fa693ea9d318a3696fd2f47f0f482b", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/negative.tf", - "similarity_id": "06c17deb1f5198a68483522d37394e87a461143609fb912e160ba1cc8752d3ee", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_usage_plan[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "d0e0872e1a1f2e2e0cd971571a48297fdeff432a05d917236f5c53aa8bf105c5", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "5475def60eec77d37dcdb225e91c03a15467fe43c1de8f432b51fd2c0edda71c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf", - "similarity_id": "5a54c4d0a1878c45af83a386c2da665d19976bf6d26c2b930b90851c6b483669", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "f518a7a3f94000a826ca0682ebe7ac227f0acdd2fafc5d935324d9fa2513d327", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", - "similarity_id": "76bbd2060aedeb8a192d188b52d0bb29feac2b2f335ecb56c1d8d14a3493913d", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf", - "similarity_id": "c7ce2c14447de28f6411bede0bb33bcb570d23ac01ef3469b0b7219eeb221791", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", - "similarity_id": "94e9567976835acc7a19a63bb0a59609ffd3378cc77a3e813ffc55954f8ec4d5", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{monitoring_positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{monitoring_positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "5077a9e4fe0c1d954d1a0de6ed48fb4a69b72dd55ed24248f69f085db72fbdc1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "99d8946712aaba18a750aa58b88e1c290fa5b96892a9345fab6756a177db4575", - "line": 40, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "309e42594c2490c0f2e677e4186913877ec0cb62ab083e1bcbda253f15d791fc", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{codebuild}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{codebuild}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{codebuild}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf", - "similarity_id": "b74abeb63a77ea3dbbb4b49c05d8d406107ae158830d2b3c0d033737f6bb5d7c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "4e2993ad7cc3e86d8b694bb06b77a6e8d365652665ba4534dfdaad2665f83dd4", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive5}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf", - "similarity_id": "dcca84e6f93c0b993b368dbfb5c6d89563079d538453bb10fd961fd82a342065", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf", - "similarity_id": "23a79dd593bc28c07e6b13e8ee9d14d60066009a448ac0d2fdd66a51247c25b8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", - "similarity_id": "59ddb8e8b17db58e3a4c0392cd11393683079052c07f47fc84f01afbf76006c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{examplebucket}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "d383b5d816b06598541ba870ba46c25fd1b915bc81733a276080f3a2b21e5f2a", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "538330f0d7f2664e1c474b8be8f371e56a7a0abe66ad7e4a8b91f052990f7082", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_codebuild_project[{{project-cloudrail-test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is defined and not null", - "actual_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/negative.tf", - "similarity_id": "7866e25259f9f2d87c3c82d898d68de16c9f7e5aee5a2439fa61308c9ea424a4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{example2}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf", - "similarity_id": "e86228dd472c4210069763481a493272dd4f326567b2f7e0310dd02e3212040b", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "9438b526285b5e564be319fca4c8dfafd2bc13d2a2cf6833fb5be9b036603fe2", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive8}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive8}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive8}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", - "similarity_id": "372baf8662a547260c4b851dfe37f8f5916748a9fa6940912f9e1eb789821406", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf", - "similarity_id": "2b678d04a71c26b117b451a681b05327b9602bc49d84d2c2d82af4512ca73711", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "69114e3ba4c6b49283e1c3d252c56ae7761392eec19671ccf3b6577bb83b7064", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", - "similarity_id": "b7abc5ccfc2a43db34510753654b9df1304500ddf1a11cb9e9202eb0099177f0", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_snapshot[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_snapshot[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_snapshot[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", - "similarity_id": "6134d78f266152ea1eb86efb67dc94da71621e290aff38f58712df8204dd7da6", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_lambda_function[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "c9c2a06bb033614c985547e6879e943fce89fa51eb9c0523621b1125da797668", - "line": 72, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{api_gw_stage}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "68bb4bb573fc3de211bb14131b734538d1e125eba670872f966d371381867f2b", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "0612a31a2e360dfb191d936f809d4eb04f86e85f50b26a995b9858f210074c76", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "3c5dee2890876ac461868702fcb14d5f5b0d6213b068e3936c74b4954e17762d", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf", - "similarity_id": "9b01035e70fcc57a6133dae0e9499e96e9a9b1ec33b240a5477bdd3f24f3da04", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{bar3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{bar3}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{bar3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "0892eccf773c3acc5a32709b9db5d98d9c93c4360d32d9dd61c1bdcd05a3b746", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf", - "similarity_id": "a60f6d0c12cee891cbae8682f124f21f1b5a1de700ca63b26b254ceddfe9c9a3", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", - "similarity_id": "c7c7520fe0078890e9e5e11c5288a889850e75e567d60854cb18bea64aacfb42", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{iam_for_lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf", - "similarity_id": "442b2ab40fb3d888f16940b05684a88397eca0354b7f7d38dccf2cbff1534740", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{default2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{default2}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{default2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", - "similarity_id": "5b8e8815977316ce2976ef335bb0a9025c1f88a0f28384727aee92dcd090fbf6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "e441857edcb5152531498652a102190fc5f772a5fadcf4dc5ab75108814c7ac5", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf", - "similarity_id": "89957dd65a545357d6db77fabbde367580e4faa18ebcd71d7194f1dbbc2686b9", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "64264ccc566144634569809fca8a21adef929e85fbf3586e6ee601d5727ed298", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst2}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "843c4fedd84f384401a5a7ea3cd9cdf9b3b70b30c6d2ce702884519ed722648a", - "line": 52, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/negative.tf", - "similarity_id": "39e23c50089bd41f8ffa563cc85f9c56a1f76e5e01d87d7772181bace60c2f03", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "516773d5d8b5859d991eac0080c80d9b28cdcf5adb681f271586b16c81263ee1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "3d1da7cd15a6d7b02324af4b7e5bacd00a121a147d5f92e83d6547b8cb29709f", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "17cf49b17a1709e5c93a8aec46cd423a7ed21d61d43544514951c46e553fc797", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{priv_ins}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{priv_ins}}].tags is defined and not null", - "actual_value": "aws_instance[{{priv_ins}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "f8237960acefac3f8be0b1d4b940cc3af4efbcf75bc7d9dd9b437446c481b9fa", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf", - "similarity_id": "c66ea2898679be6a8f49c46dbc29b7e758b9dcfbfc3237fb2f0cbf47e64ef2b3", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{test_lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "710b07691e7bde9b1b26e01bbef2664a7e9b4fe7aed2d53bfd39348a17cd33fc", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive1.tf", - "similarity_id": "2bf2b16d318d6e771c4a3b91800534d22a9d43f1fd59afcd17a01c9550003c8c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{user_updates}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf", - "similarity_id": "84ecb2f55ee0ea1f0cc8a53c34da669032d3bb8a297efd6484d64420d080b854", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf", - "similarity_id": "7225318b3652ec2522c66ba50759ca7e57a654f7deba0a46e5bef83c8ee10745", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{example}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "d13f310a8f971dcaa803346fc79f9c4ee3d27eaa11a545b9c578f9ebe3db5fef", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{test22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{test22}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{test22}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", - "similarity_id": "9abd138bb7055e8c908da4c5d1ff1d4a21327b94d04f703bb31e8e4eacb1dcd9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/negative.tf", - "similarity_id": "f93bcf6774c81663b96a5e6a1dc6caa36ccb51599e3349793ade316d6aecdc32", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_ami[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ami[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ami[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/positive.tf", - "similarity_id": "76da5875b2bdb16178726827eff6205fb2d05cdf4f40db8912c2997652388393", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf", - "similarity_id": "a17307324bf9ac6aa530e4121b4c7bb44d4fccf10d74e360686e9f4d70f3f73d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf", - "similarity_id": "3557b9ae2cc97dbf7ad7e542f6b8c901e001dad42923045b520b05ed6b186925", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "95c0025b8f189cd6480b4a252329e796b2af7d4f8237a63245d805c425f965a5", - "line": 19, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive3}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", - "similarity_id": "1d4ba686e2deab685c57ec959739832cf756fc472732de29f0be924f140ffd21", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example2}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "f954d004ed4b77e24cc14306499e91c48f7258cf7afced3448ed6242f11f1869", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf", - "similarity_id": "a46e1d381344a768ea08e407395ca3d15c2d4ba8d90332925693a9fda6579bc8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "0e32c21f3db3c8f6a9c32c3b2cf50587d2f1b4f01af841967d7bcec08e27e81a", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", - "similarity_id": "a0a359e3db745d85069cdd5127bbd40db1a312f1989180a1ddb5321bf90b999e", - "line": 20, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user_two2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user_two2}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user_two2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", - "similarity_id": "43462b733c1e294edfa2b23677ed0c17762a35471b4b5e226f8123a668999e4f", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_object[{{examplebucket_object}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null", - "actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf", - "similarity_id": "b5bb99fb037fbbbf3371564928e76aad57c8d2626a2eea94f484e96a1c30bf51", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive2}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf", - "similarity_id": "19bb6d932ff30ced592cb6f06697c37682a279b58e2409b59072a8cebd4cb079", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test3}}].tags is defined and not null", - "actual_value": "aws_lb[{{test3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf", - "similarity_id": "b94ee7878149d2266eec9affb8a88c4251bc5e26450df4465f576d8062edd957", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/memcached_disabled/test/positive.tf", - "similarity_id": "e256e337c953cfac68de9599eb93d8de58945c0a0f7faaf1fc5285c47a689535", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf", - "similarity_id": "e4386e5b567c7a3fa89c7ed629d9658b5f0a4ae68a907c46ab3a8f147244378d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{bar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{bar}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{bar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "e4428bf562f1cce5dc4e01e1e282564c7b07b36e78cba70eea41dab5698e9b13", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "d673d91073a57aac2beb5318bf56f380631c10ff3c930f679417911aef459c43", - "line": 53, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow-public-outbound-sg}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is defined and not null", - "actual_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "26241351b2fe0221db62a3ebfae01860d644375def6892313a17c1b03fb374b2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/negative.tf", - "similarity_id": "520685b25a49d58b2fb6405ba121ea90c9194ccfb3c9cabdba5d23cfc9805a98", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_cluster[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "6defdd3e776af665deba3b46a33a2bc36385c691733b07991712de30b93503f0", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb_2}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "6727e76468a4c0dbf981ccd97a118f6139cdb31a806880d82106b52316a5495c", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test-ec2-instance}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{test-ec2-instance}}].tags is defined and not null", - "actual_value": "aws_instance[{{test-ec2-instance}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf", - "similarity_id": "3e50a4fe72a239298854ddad5333e4ff841dced5e8e623b57076ca6a5d82ca19", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf", - "similarity_id": "6b66b89fa0a866d81ac52c6ccdd86215dd497e316812e039a415e553ba7993c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{postive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{postive2}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{postive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf", - "similarity_id": "c0ee11714d4663de2877de6f3550c45ff097be53bcc54c636653276b5e3a374e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "1a7ac61dbf2e3f3b73e67b797789a23ba1b3104288c2ccaab217f4f99e03e4af", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{pub_ins2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{pub_ins2}}].tags is defined and not null", - "actual_value": "aws_instance[{{pub_ins2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", - "similarity_id": "30b0cd90d8314294ece920e151fc44baea81d0e4360ef3c7ac1dfa63a9394694", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{positive2}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", - "similarity_id": "1b5f4c5e90ba877785dd878c3271237bc10260a2cadb5e0fcc8920caf186a6bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "4ab3beea6772677122a2dc6c098dd4da96a7f3e0a10c5a42d2c6201c1949e7ea", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{positive2}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/positive.tf", - "similarity_id": "3a23587ce8b3355c1b75300712e31ef250ff8ef9fa5c62a77a5bc6aa4d429db7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_service[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/positive.tf", - "similarity_id": "a2495c663f8d2f895484a0d09e450972cf56e636ca4e77683913c0df8d8c4261", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_node_group[{{positive}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_node_group[{{positive}}].tags is defined and not null", - "actual_value": "aws_eks_node_group[{{positive}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf", - "similarity_id": "bb260f0b6c15e5d4776cf607e75105e0fd7b43bfe410cc6eb644d23d360316cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf", - "similarity_id": "51e2c7ba8238d45ab5f2b4c3516efd33be100d08dadcf4d55dc1b54f48998248", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "28c4400dc5de01434bce2c767b7ca41e50ecf3dee35407c887185daa5794a9ca", - "line": 60, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "11a865b89014aac57427a30218b60da173f9e366819e0e861da91eebae74ef02", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "aa49041cf372a5c4664e67afc090a3146b802941d3ef6d49a641ef42350a5fb8", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "41f16462e622323f76759f988bc2eabacf171e244c0ab683cd1ff2e69ea90700", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", - "similarity_id": "d025d3a978ed9b644c36a889d84315d34d55a641bc17d8b186c6b6a12a64b269", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "41b2a94b87fa2d87b0818351cf71ffdce6b90c043bc2bfd556fe6d6cd49fb25d", - "line": 27, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{positive3}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", - "similarity_id": "ebbb5a684f35de823edb9a0924b75a7bcde81f46c5c026ae88d87a4c7fe25938", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "af2ae2af5eba88d65904d4dd84875de900e6fff29ff549810479c9faf91bebaf", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive4}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf", - "similarity_id": "81f6379f028e75e24409530fcb8f85dcfbc61eb3a83cbd5ca85292ec75ff0087", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_config_config_rule[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_config_rule[{{negative2}}].tags is defined and not null", - "actual_value": "aws_config_config_rule[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf", - "similarity_id": "e9191821fa3672508186a9b2724c4f2479e3db388e50b880f8567c5f2fb2f648", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{iam_for_lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", - "similarity_id": "0fed6d6b7242e47145d9d4e63d3d6705eab40ff144e458a276e7b566bb0a3edf", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf", - "similarity_id": "dc0cf59eb88b8d06885b3911334937bea36e37ae3cf5bd18b26e69fe1ed20a41", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "15bbf4504be572a31d0531d3de384c5a6a4f4e352347323838d18ad7552cfe9e", - "line": 44, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{subnet2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{subnet2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{subnet2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "a8f6b5184f718342a60cbb89593f2cb633f4ca178e84a33ecf3105cd4185386a", - "line": 49, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test2}}].tags is defined and not null", - "actual_value": "aws_lb[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf", - "similarity_id": "b9ffab0e6250113b3c983e2d48110f5e8868d1e1340c9d1e343b915ff6668dfe", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/negative.tf", - "similarity_id": "6ac7704ec9dc2e567ea8eb24c92fb328e58b7cba5f85d703792f709c77662911", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_route53_zone[{{example_com}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route53_zone[{{example_com}}].tags is defined and not null", - "actual_value": "aws_route53_zone[{{example_com}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "191c8c5756444c07dac4872af0c55ea10045ed3ef5afda326a5b8a0827ab1463", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{test}}].tags is defined and not null", - "actual_value": "aws_instance[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "7b07904eafe81902e46a81274b15a93fde5e06d4539a7aaa9754838e8aacabc8", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{example}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/negative.tf", - "similarity_id": "9eb97b557154f9117f1a9458fc0808ce877be637f3794dc3f32a537bc73ea0a7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf", - "similarity_id": "1608cc1980b8f6746dde207b10d79389d26200eea50c2b0151792314f0e92bac", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "b448f7be1851859652f26e7c494ccd5495e7f0e75ec0d306e91d3b0c3bf3f419", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "c5fca03dd66b80605ca1913831f98800d229b5680e34168bf072de14cd9443f2", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "23b677233201e3be436893d2e3788d703bb622cccf9e2c4a752b544927e35079", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "1fe5af4d7384bbb99f39916bdc159b5e765dd94bf59054c2258c815ac5145a13", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf", - "similarity_id": "1ecfa92af60fdd0a6f4bbe4c3b6e85254df9b79406100422745fc375ad2730c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_cluster_snapshot[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_cluster_snapshot[{{positive2}}].tags is defined and not null", - "actual_value": "aws_db_cluster_snapshot[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", - "similarity_id": "f1fcb93e53cae99aec8e2de3f715f280a71a3c7bff8de38124eb59199f69a6c7", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{monitoring_negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{monitoring_negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "cd7415f25e912e728eeda59d54e9a6bffbedae63188e111d80819f36ccab5ba1", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", - "similarity_id": "7be94ba0431f0f6aab830e7785d9a8b6a5e4200f5b9aa24501a769d7748330b6", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user_one2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user_one2}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user_one2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf", - "similarity_id": "18b470e6db26f7cf8a0dbf73cea3eb19d1111914ac6190341cd3546296aec031", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_config_config_rule[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_config_rule[{{positive1}}].tags is defined and not null", - "actual_value": "aws_config_config_rule[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", - "similarity_id": "9401ecc37787bb6dfae15c111e059cdfe165f5fc58d3e7d6e8d08c521b2745fa", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "9d3f19e95afa6ab7e3f58c71e5e88cb53c1c08bc499482d6d435638b7450fd63", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", - "similarity_id": "2549281003f8119ca6b95cc225206b1a798640a044ac51a59161f29716eb22c0", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "e146ebefb44f84dbf3d3e4d8bb06397f0f7a05c8c964206e64a7ad3c6e81954e", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", - "similarity_id": "35115a0fb703be0bfc5ec70b5a9b10c18e9a88a33e78067b3fb8b2ace61a6070", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_snapshot[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_snapshot[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_snapshot[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", - "similarity_id": "bd69fe7069541454d1721579dc422f53dfa161224caba76a2adf721d9b4e059f", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "ce159dc07ff57b6a33db159c5a8daa0513cb9f3db390fc7774e63b78ecfd4b20", - "line": 20, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{foo3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{foo3}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{foo3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", - "similarity_id": "1ca32488ad5b7f94154241dc6cfc3d12119f62b73452427aa30f679edf9062d3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main3}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "f6087a04b217a7028237b8ba68b4c8434e1fa2bbe4a96c7ab4356026e3d8ba5e", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{foo2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{foo2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{foo2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive1.tf", - "similarity_id": "929a5b0931f65c6bcc9947dc5c56b3ae6ed78be2136b941b563bb423a08f15e5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{user_updates}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf", - "similarity_id": "6fb58f137ac1812edfa1233a8be4b168b1606f4a6f6f0516ac8ffa9729c38c8f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf", - "similarity_id": "ad1c51ea993097ab6ccd28884eb7aaf71d62b6e7281d17a7bae2af117092bd2e", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{negative2}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f7370db98303a3141ff18f9c6d511e3064089e89208584f0b98f4ec1c688464f", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative1.tf", - "similarity_id": "6782bb830f9e9a243f7213948c57b8f560ad75badc3ee82d64ee75f0af2392b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "256a52f1799995882084d24f4339d3e925572e6ea5b25a47e74221eff9a258e7", - "line": 62, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{positive5}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf", - "similarity_id": "a801217030d3b0e8e1d56a68e537ab4d3624801e109b07b7481202613e4e339a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "f01dd34ee0ebdb8e46ad77bf6f934da1381e2264ead0b5e0979e48e2a6a757fd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dax_cluster[{{bar_1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dax_cluster[{{bar_1}}].tags is defined and not null", - "actual_value": "aws_dax_cluster[{{bar_1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "4f57ffef3e1c7732aa69af74d1886098764365d22c270e651652c13de4f8ff18", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative2}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/negative.tf", - "similarity_id": "f5a9b32284ce1a13571f82a88ee53934cd1ee53ea4703973725cdcdfc67340f9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "dfdb0c92947bbf5dbad1c647de329556bad685ab30452df4fc6e220bed6077c5", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", - "similarity_id": "3f443c494f9e99835030d4dcb9a7c0f7c33be8251b8bf7a8a2fa6ac891b0313c", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", - "similarity_id": "52ae3f8e3c3451225e115fcd134e9f83385a3670e2a15b43332737193e90584c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf", - "similarity_id": "d5b2b99ce705bd8dcfa7dc7a6d12d75f460a552e1a2249de14597ec8f0ad8951", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf", - "similarity_id": "f3fceac98bb569fa5857a123dbaf945d7f03bb0ee9587f5e8bec5ea9137e43b3", - "line": 41, - "issue_type": "MissingAttribute", - "search_key": "aws_batch_job_definition[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_batch_job_definition[{{negative2}}].tags is defined and not null", - "actual_value": "aws_batch_job_definition[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf", - "similarity_id": "d8a0693cfd4cf7e844b6ba3ad94122c93ee5a7bb122facb4b67210ef47f99ef3", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "074491364f9ad692e9ffb7a0bbb3cd753236fb964ef7a848a120fd8529f31ea5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{test222}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{test222}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{test222}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "7e3a40cb27977449a7ef70d4fc5586a8829c3e57af1f2da1ad44a82805098c7c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf", - "similarity_id": "089fedfc5231f261a14c640a619a2dc70faadba71fc7e862feedac01f4837409", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "db141d0358b8679375cddf94f05ccb8bc0144a995bcc4b7e09ff8e51ac58be82", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive2.tf", - "similarity_id": "8e556c15562a49823de6a25f3eec6d22fb8b68338b52e15b3218c0624791c732", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{test}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf", - "similarity_id": "f5c9e50ebb49a1ffd397ce6c22a6e150390a73204c52399ed624b57e7aa34ec2", - "line": 41, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{negative2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{negative2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/positive.tf", - "similarity_id": "bfffdb27fa9f3e45e177bf16c82a3e88e244f15087f216b61499d8f0e3149fec", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{secure_policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf", - "similarity_id": "ab8eab0cb98609ef178f433a70dc3b485c0cab66c7aff3b5593136712797cc5a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", - "similarity_id": "a896de7a4488ecf4ed2bf7e17c50dbc5cbe80d6cf0ec7e7cceb8baf4e82d225c", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/negative.tf", - "similarity_id": "fe8bbf056f8e1eaeb140ee0a975f35d08de2c5f5d6ea7e8d4065fd6a8a0d0e9f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a3}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf", - "similarity_id": "94dc443d27fbc47d48d7d0f50817d22dd65d178d0b8946fb1a97a274e971ce0e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "9be047f91eece591d1cd2d86edde0f580f939f598cd60078bfcfc0822aedae83", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "53d8c436c5b634d5cb3630cdc4048c9794fa7100230f8e44d70f3ff017774d27", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "2ff28c577eff196a80ab496316ed36febbc4702c0c92c217d914660582f9f12e", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "a0ef527b8f5a4c9da41f6df6680b8a157b2091de30f9a420eafff52c43249ea4", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "1fd37b8860d1f339cb5d0d820ec3260b8c4639fa05b1770300b0ae516a648cf6", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", - "similarity_id": "550dcab908a48e620a069757ad535ddfa85cae49e434b6701b71701618daba62", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/positive.tf", - "similarity_id": "7a54f0b140c53b9242768caeacc140e9b9bd756da99bb1bd236fb73c2cf18837", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", - "similarity_id": "f12c48458e5bc5cb2eecd9ec943e9d8d53dfd65e348e7791677e7566749821c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf", - "similarity_id": "14c46b7016c799a7a79d6b9fd0c32401ee2a4e8f56e52c3ea8fe10e6a5dec483", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{postive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{postive1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{postive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "78dec2f0e074b6cec468b0ff31be7171fcf42fa167f12b6c8fa1a113f8218105", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative4}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", - "similarity_id": "64f9436143b49a3cf72a64a21beca85fb87ee7ac556b100632cccaa9eb50c3d4", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "cc27a71dba8d3b20087863d9f76e10b9581a6f053045764787c56ea8bcb88918", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "70be704f4d515b1af9b96aa53f4b8fe78bd517f408650bc4696e5354843af829", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", - "similarity_id": "a74a6b1dea11536b8957c3d826d47ec0d7893e6abfed5b40199993fb901d025f", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf", - "similarity_id": "f3dfdcfe5c459cbc66bc44e4c52ed68ca4c1d8e010aa1b6c05c441db362d0a1f", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "edf1c643f1e8f2a3e75e53c218e04edd1058309964c1b37046571705c61cd3ea", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "b84eadb69e074ef9f6552414382df8510eccd16a7ca46d078cc86a10894b071c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", - "similarity_id": "851997d62c5d82575badd2bab62ee9cb016e425de931885c861b1c6a38d6cef7", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf", - "similarity_id": "1a646a74d98d1c6836ff2378ae3835e681cb56f8e396b56ff36cb93a5f0c0779", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf", - "similarity_id": "f3d4e6294e9c2c7a0ad0fdf7038a7762db61afb3b3024e79b872941da5d83976", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test33}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test33}}].tags is defined and not null", - "actual_value": "aws_lb[{{test33}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", - "similarity_id": "ce74423a5ebdb6b7fada8003325efb68fa78a83a3d8ef519ad493e4c95fd579e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{examplebucket}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", - "similarity_id": "51066425f3c3795ca8f7efdb30faf8626bcf26a0265fbf4565df041d85ba94ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{postive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{postive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{postive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", - "similarity_id": "3c55eb5b2a80ba26ca8af0a47c1b6f9d4e15ea53a58a245bb1b519f3dbf97bda", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "f32295d4e6444ca1ee2172e3411c8e4e5921b2bdc74204e8b04f92d41b5e24b0", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "327e15f99b01b0ae66997060af16201647261f4a32185c6ac602f9edacd86f15", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf", - "similarity_id": "e823d8a156d0f07f9b6dcd1e7a73cd2a074a80f86f249e8eaf8af68b2d43485e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "13e7a8f2e43cea0687127698852b3b21d39fa1fcb53e20f59a1e0f9934d56c6f", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "4aed886ca8ba5f772742ec213f79274b108c258cea7b8bd769e2fc8c82fb805c", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf", - "similarity_id": "37ea5262ecc508ffbe423bfcf90f00f3aadf676432f1370f499c0fba936ed05b", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_sagemaker_endpoint_configuration[{{negative}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has tags defined other than 'Name'", - "actual_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf", - "similarity_id": "76b5c89a698a4c22bd328d64028cdc5ed46602ae94ac6f0e7ab2e6e3600264f1", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/negative.tf", - "similarity_id": "7e30d1c222fc45220644d624bcd0567c473f44512ef1c4074b946b80304cc291", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_node_group[{{negative}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_node_group[{{negative}}].tags is defined and not null", - "actual_value": "aws_eks_node_group[{{negative}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive2.tf", - "similarity_id": "fd5d638af2b36f88ab03e0f50160b7d6e7186cc2238ede0eead63c9d9b0f3e13", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ssm_document[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ssm_document[{{positive2}}].tags is defined and not null", - "actual_value": "aws_ssm_document[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", - "similarity_id": "02aa15a78e3a1fce9d1bbe9514ff43f4629962a53e8bdb4caf1a719de3339781", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", - "similarity_id": "2d2272715a1892aa4140c5c56a4e67189e557c5d4a4f18904e9e67e70c01bd7e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/negative.tf", - "similarity_id": "450ad3925bf7c7c081215d0b88df9d5f962abebf0206d854197fd7ccc953344e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/negative.tf", - "similarity_id": "947a65993ec3259f766561b26e41910d543a4adf8de4beeb07e974fdac4643d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{example2}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "190c94b0b2b24113def0cf693efef28e6860874ea48660fee11e5f47c3bb316c", - "line": 86, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "e8f71c54fa498ad3a80065100e1ee29c295967824429b5e38b6d3817d2718234", - "line": 34, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{subnet1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{subnet1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{subnet1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf", - "similarity_id": "6fb74ea6de2af993798d4f278ca4adfde850464f08e95a13833e4b5b7c2f9773", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "d9d6421ac4b66f63d0eb549514f4d5f02e2b704cbaa39ad5ae8e11b96a55a11b", - "line": 88, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{test2}}].tags is defined and not null", - "actual_value": "aws_instance[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "940f7acd0bd8010cd1c9fa38593d16ff539c7cfd2b30c61b4e29afd7a49220eb", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive1.tf", - "similarity_id": "a2ff8df06c57aa62a69b0448eb1570586231ff4b1980f4b85f4c0b4307eb2f37", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive1.tf", - "similarity_id": "1e645af2229e581d6ccbfc984e69ec8f13ed33dc79daf3c64493c0a2395d4feb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ssm_document[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ssm_document[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ssm_document[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "44cf75869f027a88fc9cd12be7cb3ec7a053ed68145258479930d13fbc572c53", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_codebuild_project[{{project-cloudrail-test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is defined and not null", - "actual_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf", - "similarity_id": "48ad1912be1a7c206f989c2f90f8c4ad7b04223a6e0f487a15251cf8766e76fa", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{example2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "319c999a711e159ac5e65b7dfa8afa97b7171d0efd4c99b236da88b619dea086", - "line": 106, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive8}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "09ee867262e7e6a5e89c8e705d943586b75f790070f527998e0bf83a38c95b7b", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "369c6be4d1c1c8b9029abbb49f2359ecc35f2f6e88010f835c1b8df39c479f64", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/negative.tf", - "similarity_id": "66b36a3a331b1b1cfea85d6a49b153ead150a9edf8953b149e185bf230d4d1ba", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", - "similarity_id": "75e60bb9574ef6ffd13b5eac22690ce7ba9b0cbf089313475b222389b3ccb701", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/negative1.tf", - "similarity_id": "e7fcfb974dfdeca3762cf255c92bfe7f4216089777c75d4d6b303b72282f0abb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a3}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive2.tf", - "similarity_id": "218c99b72697b5d8dc69c6307d7ab67eaf598f132e22e7ae8e7be97d64836f58", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a2}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", - "similarity_id": "14fb818504232a1707691f2ccf1cafecf6bf1cebaa3ba6bdd68323c0130dd368", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example00}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example00}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example00}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf", - "similarity_id": "ba82a8835b3b1c6ad004f427b8aacc71734a973cfca0d88565cec63c07a45a45", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{postive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{postive3}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{postive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "5e3276a3079883cd1967ac89c3c3fabcf55cf944e266ad28221be632d235aa2b", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{public-bucket}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{public-bucket}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{public-bucket}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf", - "similarity_id": "40882ba50ebe6cef99ee6c065d29d681dee772dc45d8ac93be459702a05d4eb5", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "68cef50e605408b2f4b5ac9bb96a66ffd1db36034b30474b0f3e150d9cd0cc6e", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst12}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst12}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst12}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf", - "similarity_id": "767cce0dd632a163730026194e22ac1640b7f94285a6e393dd4815d6c321af00", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf", - "similarity_id": "85160dc0f396d7491a76ab02c6bced4417775566c67433ec09193dede51b3822", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", - "similarity_id": "2e3eeab7274491a175c816650f5252e268d39b2cd2ae04b8bc4e2933c5764ec7", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf", - "similarity_id": "32312921137a69ceb0994208f54402fd6b6ebdb7774e15c69bfe0720cb0ffd1f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", - "similarity_id": "bb8ea811a4ab7206c36dbeb4b06203af39515761bdd977cf62a9c112d4a4ba37", - "line": 64, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{positive4}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", - "similarity_id": "9a9768e64ec9c88afee2f1ec2a9c8c180387d9ea9ae62a77fe334dfe93440e7e", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{monitoring_positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{monitoring_positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", - "similarity_id": "1eefda542a82f205c5c82860f872d0546b31eea1839edec0ed8b56c8b3769c94", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is defined and not null", - "actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "0bbfc88181ca484edfd2fd2261fa85b4bb1993de0175f265013c85b09732cdad", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "073933d364e8ad6d7bacef5928a61cbe821b5fc435493f294ec3ac91456dbca2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "c89503ebe0fe9c3d97ba1f81eb8610cbc91eb22a66054e45f842780bfbd57cef", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/positive.tf", - "similarity_id": "60b6c30bad6a7da721e12e6e14d84d17677d21f41106a15356129723e1643d42", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf", - "similarity_id": "288e1a9fdbac6555856810a39d0bf1fb46e546bfb848b4e4811feb5c38f97fd4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf", - "similarity_id": "b77f53563a6a880962bfd89299dbc95349eac972f050899cb917e0951668f192", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_sagemaker_endpoint_configuration[{{positive}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has tags defined other than 'Name'", - "actual_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "941026080b380417420912d77b129f561181d9b2e3ee91d569e431cac0d67a66", - "line": 30, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", - "similarity_id": "e47696e665355800fe8b40f351cd52389c910778a15cdcba3c473e090975fe49", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{q}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "484bd967d7f62f8d2066b302f7aab555b2cd361a9a518439ac4e2defff74641a", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf", - "similarity_id": "500b7547ffb7778f44855cb5cf190e7e38866113ed35943a4123b4da6c269a42", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "829e673f5c8332d89c31c1978e66b2d942636a906f1e5cac455803807577adcf", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{test_lambda2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{test_lambda2}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{test_lambda2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf", - "similarity_id": "687905ea8280a48775153b37d3be9033740f7b3e3c5cc7152c56a6b05b33b40f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/negative.tf", - "similarity_id": "df97fdb5bc3354afea3801215dad5085d9eb4cb30814860d9a8e17dfd3516bf2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{test}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", - "similarity_id": "64d5c93496ff0fc2b53d638f479cc0a6c7928e8d21afdeda76ad3e520e0b79ef", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/negative.tf", - "similarity_id": "b9940003156e61ad5af63d9f063bb4ebcba6b3d2db8ae8946a84b8cd1807f092", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf", - "similarity_id": "0954f8c38e1399b5164268b9378ead9df9efb931a38966685b3ceb453ceb8cb0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "58006aa5953a62be80285d965954cc1ddc588d9db124fe35d0255929101dbab2", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/negative.tf", - "similarity_id": "eb93bbb35d65945543c9ddf7517140502fa2273da99719e4e3c99e42deb9b7bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_service[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/positive.tf", - "similarity_id": "1552e46b1c05e6c811a3b182b1e7e3c57940af23bd9e4aae7829c1b467ed5c70", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/positive1.tf", - "similarity_id": "eac23ef05dc1b31c79e841fd89771455c6e9ca54d78f76ad4e5cdf7701ca25b4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf", - "similarity_id": "76abc79cf8a5c8b582da62599653ceb331395c7c901a503698db1801ae4c3344", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive8}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "3b19eeb18c5870604f4a1c5877bed3d2875fa8d36c291da1edd6d66c3dffafef", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf", - "similarity_id": "e7d25e8eeb6d8ec494e7b4ac1c04c0f0669db04237eaefbd800eb957df74b539", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "6da67a3b662c358b5e57f30b725257ef9d3d4138c8bb2cb39bd90c67b7dba7d1", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "24ff225d1c5b993e14cbb4596d8fd51f91d0b8f6032a9ce5be778cb884990ff6", - "line": 42, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{positive3}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive1.tf", - "similarity_id": "426e3a813d3ffcd446db3239b2d3038a4f2c6f461d4bb26bddb8223da7b48b48", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", - "similarity_id": "df39e50db13cba60d95fe31f5eab483202659abd08461215f8c74bedbab1c13f", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{negative2}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", - "similarity_id": "20b95cb272833a8a109c5bb61bb9615185b925cecea16b8af4088353029925be", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf", - "similarity_id": "2fe8152d51efcca906e01bfaae31e6ec135c595ed8e683a493d9c984b526bbc6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "2da471f3f0000cf5f7e0f835c30d186ccced1c2abc67f0172005011b911c202c", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{cloud_watch_logs_role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", - "similarity_id": "794209cbf85465e34efcfbccca6713bd3186deb2e920ae6eb7978a7eb63e5e3b", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo3}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", - "similarity_id": "6beb1129fcf99437ee86c63bc30cc6e165bd4caa5519a5b84d2c3506591b4231", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/negative1.tf", - "similarity_id": "1ffb0212fafe640ee6fe652f72ba6a0db50d92b743b6fc3a41db0bf907f1c218", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_athena_workgroup[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null", - "actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "024b277b161a021d1ab8f88a3a357598489e37b1a6f2d41310ee737894d0bd7d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf", - "similarity_id": "360b22fab444d5ce9f344a0c2307a7ee7b1e64e5eb98137fb12e661ea4037684", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_has_expired/test/positive.tf", - "similarity_id": "dfb387d971fc64e3777466c11ecbd69f79ab5bfafd360e31184d35a99a13a823", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "0de03be8af24c0dcfede23eb7e42765a8063bc04acdfc29aadd8c2ea070fd0d1", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_dax_cluster[{{bar_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dax_cluster[{{bar_2}}].tags is defined and not null", - "actual_value": "aws_dax_cluster[{{bar_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf", - "similarity_id": "f5aaad4dd6c2ca25d65175f8a3efc6b4ed225fdb1d8d507ad27c01b5ef2ae708", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{all_features_allowed}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{all_features_allowed}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{all_features_allowed}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf", - "similarity_id": "b1cac7f2deae0e332762d6bfa090ff8439dfb132113cd5ccb48e67eaa0674f2d", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{es-not-secure-policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", - "similarity_id": "edaf2a8443111522214d44e2aab150717a989f64c0f3af02bd3e0b2d5d89c274", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", - "similarity_id": "8da9369ce85355a8b706969db784e00e8518b6b0279c80e4dcfd5cf89a5abd97", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf", - "similarity_id": "ff2e59a4f5847a96e125ccb9dd7e695cf0aa1ed9668e7922edf320efb9c18b53", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{negative2}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "1d07c4736e5ffe5e83f6cc8c8d9b96b3cadf2b88524d6fcef720e6736b4f1ae0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf", - "similarity_id": "8b598fca21f90eab1c38ea28e78402bd29c1d77d60ce990152fb163fc5dfca5b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive7}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf", - "similarity_id": "34b5b7eea0d1690bd684b0140bd95f02a6bed19b62d55d81c164724579734239", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_batch_job_definition[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_batch_job_definition[{{negative1}}].tags is defined and not null", - "actual_value": "aws_batch_job_definition[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "4ad915e306da616399af5c92a17a38d7ad7009704f672e619000aa24abb00cce", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive9}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive9}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive9}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "d961bd5b5e4844adf4488400a9dfa78200d42a324d5d415a30e3f6cacf696521", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "1c81e014d1dba3dbe8f95cc647a6abddd3205d7892fea3e05258283f2354ae57", - "line": 72, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile2}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/positive.tf", - "similarity_id": "0af559c0122892553f90855f00c2dc2669f195fd97f9b573f4f703f5afe65452", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/negative.tf", - "similarity_id": "38e3965e93bc0ebb8ab6db47d0c59b857458c46eb00a8989411bdd95512ca7a8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/negative.tf", - "similarity_id": "bc197c47743fa87497d3de82891388000a4fb5968946bd9f553aab9abcd4ddce", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{q}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf", - "similarity_id": "d497fe33ae44fb7021c9c883a0aaf0613e3411afa4fa3433e10a1ff2a4081147", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "8e7be03f53c62ffaae7813f12a0c06ccb29755838f44d36f8585269d40a6f369", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf", - "similarity_id": "f711138300784437dc5f7c823ceba28c141779c8c58fe3a201099e6b11b895ab", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/negative.tf", - "similarity_id": "5167dc07bf8f7fb6e49408cc60a1b16119c4125be4afc310802e4dc72b635730", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/positive1.tf", - "similarity_id": "830435bb3a6cec187deb229545c04668edc00b7b52a4501d979bed68411f9fcb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive2.tf", - "similarity_id": "08ecd82604c837198214db3d23dd03776424433f730b26c8531abe08e083d36d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_server_certificate[{{test_cert2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_server_certificate[{{test_cert2}}].tags is defined and not null", - "actual_value": "aws_iam_server_certificate[{{test_cert2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "29a669983f734fac7e9fb8630bd673060936c2421a1925ba61d202c1848f762c", - "line": 76, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "d2e5c09aa3f99b431a4394cc403c12465d9d6a8f1e4a28a226977ed84a3b48f3", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "e9b3bb858a83b6d24edc03184e003f9e44d0890f86e14bbc2c80d11129382560", - "line": 69, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", - "similarity_id": "e9ce565c69fbda08c58433b8f7c1e2f9b7aae9ade07bd0ab3df1caeb2ac2d590", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/positive.tf", - "similarity_id": "5d44077d925c17af7698395a5cffd4beb5e710963ac785dba18f0c29eba1ed9b", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{lb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{lb}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{lb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf", - "similarity_id": "65d0652aeba60add05c49c1836f10460412d48fb0fbbd8f48669015935dde10a", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{default}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{default}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{default}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "04312fe7b2d21d6262efea71e6fecf482e5e95d1af61f5adb6cb92e87bcfc48f", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", - "similarity_id": "f54d8a536aa7ccf58605e825a61eb744b74e53b1fb90689570299f803a85b4e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf", - "similarity_id": "911d257c2a1854408c40ab0a879d522b5ba258faffe9a92caa95f5e02794b307", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive3.tf", - "similarity_id": "6f75dad11972a091197752a1614c603d3b9a25a0447ecafcf3ffe32e2ecc45d6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive3}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", - "similarity_id": "131afae0005f9daec5d98c96ab5b741ef6cad8da9fdc8ac80c6b46b07536b778", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "efd58a6c5ba604f8a387bf22bb7efffc84ff34ef00393e62d8156048fdada7b6", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "badf30c5be23c8df8bb35d193a1b8ff8ededa67916b2f5ff808be09eae34a459", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "737bf3609d45ae5511492b7ce02f35b9036696032a452266d0f111967613ad95", - "line": 24, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf", - "similarity_id": "c7978d6fedf8fa7d86f5162e4d2ea81b653fe62542b97ba75160afd5a1a4d49e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{negative1}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", - "similarity_id": "d311972bbcc9a536b29f16ef805c908cc3e391652f3ef1a68cde012db2e2475c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/positive1.tf", - "similarity_id": "3eaec0622f056cce42179f558af3e321578d403acf3a413db1f8e7102daf412d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{postgresql}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf", - "similarity_id": "e1d94934cc89878e082e1ecfecbbad0151f98890374adc2efba1ccdbc49ca4a6", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "4f591321f29717ab20238b97e1f78e4e469f9cd0eead4e86e0a75c61dacad232", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "fe0f89f652c7cbd6ddef463af3a44fa497771f7d997334eae281e0fffe5498d6", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf", - "similarity_id": "1dc960204a220423bb6e50a55d56d308c6ef87099f4742719851509ff87704c4", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf", - "similarity_id": "1f986e6289426c21229cef00384479093e6af8c3e70497f1692d6eed4d4cf9d3", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user_one}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user_one}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user_one}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "938febd5c740791bec6131780a344b1963a0202f8896f43edf896cc6084892ee", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "da3ea37f2c4b6ad1490d9391fb9bb72660f55fc54fdd19ea994769f868fe6aad", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{test_policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{test_policy}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{test_policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "6b87bd5cc26e20ba7e65658041ab8520d47c6e28e7b027c9ac75831a252ca41d", - "line": 76, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "7cc7e5f4ee9f8797a0fa83c818a3bd9561b54ceaf9abba2aef810e21cdfae483", - "line": 56, - "issue_type": "MissingAttribute", - "search_key": "aws_lb_target_group[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb_target_group[{{test}}].tags is defined and not null", - "actual_value": "aws_lb_target_group[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "10b45e9e1c8e13ea719d055373f17142b5647e5dbc133a53f1d6342a4ee665e8", - "line": 30, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is defined and not null", - "actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "49e946826e6f62abd4671001251649aea7582e47fd5e8e89fea93b51f0214344", - "line": 34, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{subnet12}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{subnet12}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{subnet12}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf", - "similarity_id": "30ebc9cfe821c29299307b1681442b594380f300b92499b61d1efb5e7cc57c22", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf", - "similarity_id": "55232098e347cf4d09ff1265ad24d2ec357926285bdf8108950604309233afcb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive1.tf", - "similarity_id": "37eda2d6d82cd29db279b251e529171cef14adfe8cfc0a157feb970983524a62", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "315a543709fcd468a6166d109fc8bde2aba48a1fa0624b7c69e3654bebe3c649", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive1.tf", - "similarity_id": "b73954a6100888886150b6cc3c2590d2f1f002528c6215212046131683bd4196", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", - "similarity_id": "946fea4bd27d1d8f3cc8bd68a34c71edbb9eb1525730e64c67bde19b9171ce53", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf", - "similarity_id": "7363b637ffd75998a8dcec86cbda05f30e0d78f9d19603c42d3de1d194249e36", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "d328425ea162f5ba17d8409d650a3e3f4e120963272b8f28af36b1b8d031b6b9", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf", - "similarity_id": "f200d7876928cae8f5e4eab919d77a928cf3b076dd855ebdd59bc6d327927d98", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "d30db3e7e5157e5e1ec674073be6de016b8cf56f835c471aa1b54692060f66d5", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_internet_gateway[{{igw}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_internet_gateway[{{igw}}].tags is defined and not null", - "actual_value": "aws_internet_gateway[{{igw}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", - "similarity_id": "af477de158b795b7f2fb383111d041022c195420495399385dd5232dcf838f1d", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{example_2}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{example_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf", - "similarity_id": "b42965f41e8276ea50c3f9e8cb3113ec705c0160cc9e611f5851df98806fddcb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "8514bc27efb710c8f777d267aeeac35a2b850b65dfd4f27fd54cc295dc547eac", - "line": 56, - "issue_type": "MissingAttribute", - "search_key": "aws_lb_target_group[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb_target_group[{{test2}}].tags is defined and not null", - "actual_value": "aws_lb_target_group[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "44cafc7a4ce5812940902c3bb801c30b4bfb86bb6c83648f8580e4ac1d5a9d06", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf", - "similarity_id": "861259c88ab87d1e97be8d6609e6de302001940618e4f2c266a939b648099141", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{positive4}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", - "similarity_id": "4c5f220b8db7539f7fca93f337eeb51b9b1b1f8157952bb5b130a87a6de1be42", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf", - "similarity_id": "fed199249c11dfa3c87814b8ea3731d122ca9a93eef49e8a3615f7d8f6c21303", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", - "similarity_id": "575a877c3c41a2b890775d30bc509c1d00278ab3509ba7b210ec5b0e77286cb7", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf", - "similarity_id": "7075baa6293ecaa00e4d8e9ee94c0120058c6fe8b83859929be25f8396634528", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive3}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", - "similarity_id": "b01484f07af857ead34f6373d174104e0082153644164e858b2f58784af8a9b7", - "line": 24, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "d3805150a049b0d187cf192a75f80aa7b6a1ccb154c616194c9365a53bb52feb", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf", - "similarity_id": "62ee282556d5792c87b241ded26ef2ce69f553bd45b9753464f33e46df623f5b", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{positive2}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", - "similarity_id": "4949e7cfcad54198417fd3981a16044b7d399ed25884d49569ed9a1c4394cb29", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", - "similarity_id": "23167c354cf704c54617b66a313bc67f36962177e03e24ac31fe7fd05482e071", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "e4e767b2000c6183ccb9a036048e783fd71f48ea094c18c5886808cbce865db4", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive6}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive6}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive6}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "b57e9977e1745174e6249dde1c5311f1adb4912a469ba63aa25828ea343cf74a", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf", - "similarity_id": "911aa7f5bcac0ed1c8c5e258939f04c784054cc5b0a70bb68494ce46dd794e43", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_route53_zone[{{log_group_mismatch}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route53_zone[{{log_group_mismatch}}].tags is defined and not null", - "actual_value": "aws_route53_zone[{{log_group_mismatch}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/negative1.tf", - "similarity_id": "64f804060c4cddfcf454cb25522fd8fb7ac19723211ceea061711ae2df4f99a7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", - "similarity_id": "c42891cee565577e3c5bb338c11d652914894a039b9b4f7308a2b159a3d1595b", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", - "similarity_id": "f402c940fcb657fe183e95aff4936e6798329dfab1133fda5d3a36ec449dc32b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "d35f2ba315f1450faf1f860e38d516d87753f8e0b76e99562275ebe54a598cb1", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/negative.tf", - "similarity_id": "e8542ce93bd9d316e2f1f375d89b4b898c180a87abc2e61934a64271cccb51b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/negative.tf", - "similarity_id": "c745a2628de1bd44e2d2d2fc5dc41369683b81c64dc172878cb421b63c14205f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", - "similarity_id": "31d155f2c7aa1f689187f8440758f2bb216d72da71f70b923e790a14bc8dd5f6", - "line": 41, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{postive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{postive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{postive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "a0b383612bdc292ed1d31680c997a3529f07a63adb4985178ddc02fe5a01e732", - "line": 76, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/negative.tf", - "similarity_id": "d9df150b24779b16c197ce62e3007c939b807130482708c83dc6d2e49ded5db6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "f4beb44c2ac02e1800e292c8be6a03a42576cc66ac6085230afc63353ec5a1fa", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", - "similarity_id": "9a29a7695a6996ae6869c34f556bce5896f74ef65d4471ba1c53471b8765786a", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/positive.tf", - "similarity_id": "44f6bccaaea1d6642e9e34e7d2c599fbac824e768d6acfa1e3f9ce1f2e14ca13", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{not_secure_policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "ef721ba48c4988277b4b6ed7d2fffb7b06ec5994f5722d027322611b9616774a", - "line": 91, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive7}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", - "similarity_id": "aece977fc4e0c4f038b764fcab94b8dc5c16bca7e961062c2d33b64ea9ba1ca5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf", - "similarity_id": "04cf4e8ce615ab352bb9ea9eeafca8eb1691184cb91fb2bf478f2a76e0379d38", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", - "similarity_id": "12d8964e2f6c3e65150439272cacfebd9ff18f1181da7a52a1ac25a05aa33bbb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative1.tf", - "similarity_id": "355289dbb5db97f13bc02e2d4627c4eacbb66d53ba3d6c5cba8bbffdfcb194b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative1.tf", - "similarity_id": "db3812848ec337cf9f78b3b60ead7016b2110cd982168b98a3ddec8faa14ea55", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "b0546040c33ab273676aacd6500cd5253a60495deaddf9aff15af3b3d6c56b10", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "e9646fa15d593eed7a0d0a393b74ba6921c33ee1b7c86eef61b3912d15c1a53a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "27ca396eaeabee9269bdeb7e2c05b67c981457d615374899d56fe5ff6e23b61c", - "line": 51, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{test_role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf", - "similarity_id": "54674de9e98cafbba34b292128a2d78f070c2d1e96e1ba945f16d3d441599732", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{example3}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", - "similarity_id": "11e938d695ed577f9229ef5a765698fb14ec5b0d76584b31f9d0b6f51627d916", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", - "similarity_id": "ee11fab17604538603125981a3fcd874e325047fd6f0f0b1fdb6353f6992efe5", - "line": 28, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{q_aws_array}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{q_aws_array}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{q_aws_array}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "68dd1ffa0d5c13b75e0a4a715b10c78e3c41bc5433d854bdcb88e93a94002425", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "f6a012672b69527fd3b269c7e06a32e5ca47655f9de04a4ab673ad51226769d5", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{lambda-role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{lambda-role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{lambda-role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "bf54447c7468376cfa4514ac82e9d83285981508caa3efc07700c2d75ccfda7c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "00b1abf495c2f3751082be775eb791baa7ca79eda7477f82fd829d10b106da9f", - "line": 106, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive8}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "de8063d843362cb4cb736ef0ea226e5ffc232369629c20127fa50dbe04e5e73e", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "49a6a35d70985a8fe28c25517a29523eb8142480dc9ee6fcd660f8f63bc71375", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/positive.tf", - "similarity_id": "87f7326890fef77ad4fc5dc79c0843de9dbc2866986c4c3ded61d7a8a6e98a97", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster_instance[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster_instance[{{example}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster_instance[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "a481971bf91659a20d2dc88a962b66e19c9588274096253db0bb9f61ada5d937", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/negative.tf", - "similarity_id": "362d22d6bcf8d2eda166d145891819ecd8226dd01aff79db2a95fb1ca7b62031", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "a72dbd082eb5ff41a6e267233afaabe531dc75157251c049919cb2fbdf8d0cf9", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf", - "similarity_id": "1a51b789e457a906da665bd95de7ac24e48da9dc440ee393e2431a5feb797dd3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf", - "similarity_id": "f0c9a0ebd2a39e2db1eefa68ca65b2a147d95a29970e0df7c902fa4be2aeea22", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf", - "similarity_id": "60993c1b4eadb9f38ebcb44ae858212de2ed4141c972f5406dbc5319ae954941", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf", - "similarity_id": "8436377b3c283b1ff432dd0c4b9304a040ffca7df54123d7eb7672cc3c69d563", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{example}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", - "similarity_id": "9df8edee04574e02cad57184eca2bc66c168cee6c636db4af33607f406f297c2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{positive1}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/negative.tf", - "similarity_id": "add4bcc38064f706367376cad320dcc1d2e045aac18b8cbbefa2217fe254e00a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "0ee636437b6c7a52bb125dc9a212535084efd14c21858d807a7b6bb552175b4b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf", - "similarity_id": "1480987850b106de2e3229287bab921c86cc9807c7e4337d6b4095af70195edd", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{negative1}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "d842c78be33ffec57a9d1d44740c2213e27fa4ea1db4af9d93432d67884fc06b", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", - "similarity_id": "c0954749a3431925300c4fb106d2529af49c9551e66aba172fd53c4027827b2c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "0d40f0a1db07d4055d196c96760cc845945c884404dd86172ac69398b3dccf46", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf", - "similarity_id": "058ee0fc9ebc6f3ca04f5b76328f4dca47a2cf69f74b08089b27623bb56e29eb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_cluster[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/negative1.tf", - "similarity_id": "23e6292ef9b1a36f93e2098ca9914c07bb43a7f7abe913163a0e0d35e40e8efd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{service}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", - "similarity_id": "c5b0d4f93b74205883e45966ec9af2e820711ab2510ee5ff7d15a9d547262c5b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", - "similarity_id": "bf6dd48cf6d1203cb7c72d21eccdc499882264dab222b8d73bf210f935f645e2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_acm_certificate[{{cert}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_acm_certificate[{{cert}}].tags is defined and not null", - "actual_value": "aws_acm_certificate[{{cert}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", - "similarity_id": "38cb6982d7461cd71fafc837785e37cbbbaa74698a67bcfc28cb6a2729a809ca", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "9d0414dcc59e22da3ead9aded256183b52397a20ac2ac572de66a334d3884940", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst3}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "dd0bebc9a146da82a4bb62e589ad4c6c43dd3da8362a2456ddcde3867f928b91", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "2f82b0cd9f8770c98ce312929455de6f2265c3edf8c7674741f1794f13cfc68f", - "line": 71, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile5}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf", - "similarity_id": "9de1651fa54629a08b3048245e5c99a2f01c87d15b203e09f28e61e60efcfcfd", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", - "similarity_id": "1d28706ea412ac062081e2eb4f9237e6febd748f8ac0a5305ca4bc23520ad075", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "2d88d97c2ba586f2c7f9bac47cefbcc4eac8e7f8c861d5c2721c925ee4d73b3a", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf", - "similarity_id": "6a98d6eb981ad760fc362d285322b751d3795e56f3431d5bb7d07b88690ca782", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf", - "similarity_id": "2f8f4e55043aeaf8060cde74f24b07e07ab27b147d56f943e87f228bfcf3f6a2", - "line": 40, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "f4ff64572cf8624c6a73e062d084aaf7063ff966a47acf2f2b6d04c70a879520", - "line": 90, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive1.tf", - "similarity_id": "380f8a5a1bd203426cfd58e775b01fa99714e9641bb19406c683cd1f2651f499", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{test2}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "b61f222dd03a344da25ac882c4f8d6275425b042a0e8b25a4270c89b3c059291", - "line": 63, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{dsg}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{dsg}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{dsg}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/positive.tf", - "similarity_id": "6492e3bb40272db9ca02a049c91aa7c38784d0c9715890780d433eb4891ae742", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "d194cf00dc68d1ad5b3ab4a338276adbff98456c011d8ec51e1b5c8818888994", - "line": 66, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile1}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf", - "similarity_id": "7a5d0d4a8aa566b266147380f833bb6538e6e758807642419c9fb0b588d0677e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "da98fa80bfdbbbd1439b4f1890d90eaa34f0b83426380542afa2450bea4d04be", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_dax_cluster[{{bar_3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dax_cluster[{{bar_3}}].tags is defined and not null", - "actual_value": "aws_dax_cluster[{{bar_3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "59800085fef26e10d75221d6441c4b5dc695c15981aadc63a69c3bf558ec9764", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{iam_for_lambda2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{iam_for_lambda2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{iam_for_lambda2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "64f3ae5cb1ae3833c96ea65e885e8275d09759239b25929cef39e04851bb1e31", - "line": 45, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{test_lambda3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{test_lambda3}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{test_lambda3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf", - "similarity_id": "77ddb67294ee6322fd636ef53f280e7b499721455a3376bd47ac7d337d03a1db", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_vpc[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "3cc0b7ea613935c4f4d7bdc54430e220928a285a7e077282f73322135a710761", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{codebuild2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{codebuild2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{codebuild2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive2.tf", - "similarity_id": "23f06ba7f2632a0e968726458bec36539432a3def4ad540f876613001d339117", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{positive3}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "67af587d429a510c8bbb24eea60c161a77fe115288afd2d57e759bf676736e68", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is defined and not null", - "actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", - "similarity_id": "42ecc118e2a125e40ff4e8e994daabaff1fba3d096dfb85dd1ad74fec3bfe567", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example1}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "e6cb93ea861b3f03f0ce6dcde8739a86a5174cebdc713e3b0a658b66bbad9a3a", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", - "similarity_id": "7894314f1bb6c353c55e9df5b1a482fc4cd1d033a9b09227aff2f3536a08afab", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_ami[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ami[{{positive3}}].tags is defined and not null", - "actual_value": "aws_ami[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf", - "similarity_id": "33e2a1632801f87e790fdc9bfa89ccca2900eac657449781e906de237ab6f3b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf", - "similarity_id": "c0f28dfdee8b6f17b11c0f1c23f56965ec53701851c9d9332dc6513d959826a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", - "similarity_id": "f658bc37686769dab71201ca47ae2e4e8ae221c6bcf7b9abfe5a6e0fb9b15dd5", - "line": 64, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", - "similarity_id": "5585cab123f52514fa535f5ff99a46b0dc91d09244ba0e4c18e00fbcb8e154af", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/negative1.tf", - "similarity_id": "fa9118747c5aad19e45ef1bd8a9304d6a27bf6657f6bf64a7fa9ef7068aec348", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", - "similarity_id": "00f9de83cedf8974239af44f1cb7d314ac6fc2a828fb08766db0cd2f8868091a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{b}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/negative.tf", - "similarity_id": "ef59ce8cc6ee3d93e05acfef697f5e9b58bd268956fd9b896c18d9929219469a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ssm_document[{{negative}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ssm_document[{{negative}}].tags is defined and not null", - "actual_value": "aws_ssm_document[{{negative}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", - "similarity_id": "ac4f9cbe5003cebb1c4d0f8dfc1ac309628bd3a4ae8ba3dd6df32aff24101e68", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_athena_workgroup[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null", - "actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf", - "similarity_id": "9cbb69e3c91b531151b51aafa32f4e6d1a38281fd118942b15e5de232f8721b5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_config_config_rule[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_config_rule[{{negative1}}].tags is defined and not null", - "actual_value": "aws_config_config_rule[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", - "similarity_id": "33e698690ec58b289134ba3553d2ac94fb844ee0b6afe9bf71432c7decdf8387", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/negative.tf", - "similarity_id": "43d347b5382dcf0d85e858455aa63fe4424e7f4841836f902d4046c7cab98c26", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster_instance[{{negative}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster_instance[{{negative}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster_instance[{{negative}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "b67fa0956e0a1b91b3556b92447b6827b0416845ecbc0986dc4aa8db61a994f4", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", - "similarity_id": "255e174a91bb6ca25dd86895b44ed007d99beb1dd54e6bc05ba27a551d79c518", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{test_lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", - "similarity_id": "691377719393a88c71a5b95170e86d3506e97e1c55df278b27ec7c86009a970d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", - "similarity_id": "17d4cd0e8489ef9b016415046fb0ec40cfc95bf0475ad8f375471d708876eb26", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", - "similarity_id": "3c3ad490b88fae3262e297e43719cbd06120af70d8f10b9cee814460ad19ca31", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_ami[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ami[{{positive2}}].tags is defined and not null", - "actual_value": "aws_ami[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", - "similarity_id": "371b69531b7eb0c269275c8e8b3d328819f4b29c500218b5e364c5d666a371f7", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{q_aws}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{q_aws}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{q_aws}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "4d38df0194d335ff891c61f9d82c4f162bc3d082b4a6fd8d186dced344319d3a", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf", - "similarity_id": "4ba7fe12c1407e79b10aa5914db2179c929a550ad20a53318619087248f65b0d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", - "similarity_id": "cad43037f560ca1924a9c90fa5d19f096c7b2240f384f2f300c1e331bea48856", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", - "similarity_id": "4fe751a15cd90a307f4f6b54c54356c079c470ef834d00624aa785c077e10207", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_object[{{examplebucket_object}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null", - "actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "1460d114b75bd15da8a53d2d505b3f03457384f0e9c708e245cfd901b6c924fc", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "369d9fcf12363afcc763cb869aef150ea81305afacba1bf0d57ebe6d579266d0", - "line": 72, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "762152dbf211afdd3def573e8bba9100d4e3fc85da1c215b4d82b3b5d1c52da7", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf", - "similarity_id": "1694af784b2890619c1a2eba5372620db623c4cbe48009e387a2213ac917b079", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "03df93e9bf127e7171c34ea92c3c888b9d94556338dacda1c70d7f972c3119e0", - "line": 23, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "1ee0cd3359c1b7fa224c745b9b5c1b6d8fd25d59063856454507d1811e5e8c3c", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "6062554f7080cbfcb7e82cef9c8642ef5104d47741b4408fb95e956b8eacd469", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", - "similarity_id": "38b0b47595475cf25ca2db234daad913a20519ca1c635b0f745ab2fa5fd40aec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "499e429ee05b925d74808ddd398ca9bc7e6a06c24a5a90647d070109b6a5afd4", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf", - "similarity_id": "075d2bb6cc4d08eef2a2f4b7097ff4a10cafd07668d7f13148db28d5091e9ae4", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "163971bbbf493fb1a8331582d92b6ff7df7ca1ca5327beadca306896f13456c5", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "717cf4963f674d5c5918c44a95ef3c795185fdb51be4b3451896771466139b7d", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "99b8718f26ec19b0ce1fc68ffd16ce990012a310d605be88c8c1051955c44b99", - "line": 53, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/positive1.tf", - "similarity_id": "08bd08456d7924d025233ee6186fb710c1b76e7388a50cfe956c6e3bca439209", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{example}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "2ededcdd11b3dd8ec11aebdc31663326426fc56c18c38553f05501bb17ad3b06", - "line": 19, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "dc709bf7a1d3eedc7802ff6b49d5b31f4848bbd9f2ed58dd35a9754558d39d0b", - "line": 67, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf", - "similarity_id": "186ddbbfae216891ef19ec19b9ecefc39476131d70773ed307d2bae0d0b2d24e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", - "similarity_id": "3ab2487e28261dab79c7df0c5c958fda5a5ee28b2c2b3b14a5689b84aa3fec0b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "e8ec4e91b1a690bb82c7954c5db336f9ca782d5975333aef74aa1aea32ad01e1", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "df7be6940efbd99be9e931c7e6f362224ad4224e7b92a2f30fbc02fbfb1f96e3", - "line": 80, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", - "similarity_id": "a10c0c7ad96cbff1a8bee0d121de0f3f1af4652fc4a89713bd25e43809c22e1e", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", - "similarity_id": "1dee35cdb166279d17470fe403e40b307d91b327bbab9115310519e2ccdd70d4", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{disabled_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null", - "actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/positive.tf", - "similarity_id": "9c41bc969168420830ea834f42edd8fb090cdb6051a1a5422afdaa6b1d8ad31b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "ddc6e3c020474937782826aa002f6abb1c6c9a66d53f2da52984fe7de23e7fff", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", - "similarity_id": "7bfe3fdde1154909c1f033c9fddbfb9c9d0a05c757bd4cd96e71d2597427a3cf", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{positive3}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/negative.tf", - "similarity_id": "f9acbe3d5ff37a69e3591d00b1b982e0bad2d0de4879b5446b9c814f45056c9d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf", - "similarity_id": "eb7a8280f79beefa08c97eb27424284ab2f0c061fcdd80c0aaa46f043b767afa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/negative1.tf", - "similarity_id": "18f5fc4617f9f02db4aafc68209bcc43ca273c2bfc420c06390d2466da153a93", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{example}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "c5796037a6c6dd9ec62bcdd14fba70fc86d894e93e629744946ec98670b794fc", - "line": 51, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{test_role2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{test_role2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{test_role2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive1.tf", - "similarity_id": "b76bb63d0fe87769f0f5760dbc963d9973c0eff03cb994d0bac2a1c85acf24cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf", - "similarity_id": "d861b8319f64b5b27a0b5ef8e6b6425fb817e2fa24de1966a9b6e98d84fbb346", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive1.tf", - "similarity_id": "4d4f54f186e3f133bbfc776833587aa21ad50621e7eae5c21306706590f42c7f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "702f509ae841055208e001af8fa7ca8b3016725173987c0a0d9ef07d1967f655", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "a244d588c8457e9d17aff7ab0881e78cd7e7ee24b86303fefc3b275289c7ca73", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "5039c269aed724abfad32d1c29291cfef836fcd835dca2a8f2f21253d428d26d", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", - "similarity_id": "0f320bbb08a464ad3bb201576c6ab8fe0ab7515b5538f0365d3d47d19b4a4f5a", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", - "similarity_id": "53ba19713edd180b6038950f1ff1fc1afbaab73ea4189808d3d9ae3388fad567", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", - "similarity_id": "f049e2f4b1410080c08b7fdd77e814e5032943642bfaa92e8d9293126a3dd0a6", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf", - "similarity_id": "4e5f465f56142a344ce9f324875fc4684f341c8f90ff397b5ecedf5a4c8a8d22", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", - "similarity_id": "d85c3901d6445c824c3205812d9e0b4ce0285ee1055db4434284d399fc1521a5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/negative.tf", - "similarity_id": "fbec022839c6cac31f117cceb5a9883392700eaa7c34d6c9899534dee636e5b6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "e5d0ff714dc834507f94824c26905ee1102f6d95c36d0970ecba2b12552a1619", - "line": 52, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", - "similarity_id": "2fe5ca60f925f1faa050b6a00f1e4ab559ece56062407fb40789cd0c6bf6f14b", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", - "similarity_id": "4efefabf083ba0758f994f07e6c0c6e2d03c049a9f9a811123260110236cf0ca", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{negative2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{negative2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{negative2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf", - "similarity_id": "acf8cb689ff30f9cb83a11625b86ebf6c3cc257db0561240c03607c1ba695af9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{mainvpc2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{mainvpc2}}].tags is defined and not null", - "actual_value": "aws_vpc[{{mainvpc2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf", - "similarity_id": "e2d8037886c3bdf488e71230a00947af99426033c301655a49e5cd1e82b2682c", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{not_secure}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{not_secure}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{not_secure}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "0e1caf5ee91f0953bd914f1e3b0cf3a467c663135c80cdcbf83213f12cd61a29", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "92035e70ffe2241953d3e583cc1aee9d83c867f810614838cd3b96f6f81f8f32", - "line": 63, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{dsg2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{dsg2}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{dsg2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/negative.tf", - "similarity_id": "24bb2934969beeb06f1b9bf414e98f9559e37d338267ed4dc409cc62756c3ff5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", - "similarity_id": "9e06c6e1603dd8174b1244ffe631c81c2a6c0615b012755155b90da9be3d0cde", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf", - "similarity_id": "1a38a4f86212d5c9cff8034f5cac14b43dedcc8e75cb3de8ed1501548d8490bc", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{default3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{default3}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{default3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "ae01458619d3cb08379e2a0f5c2a124ee3a1b661b6cf51b45d3aed0182a2c74c", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf", - "similarity_id": "fb60c9676378238bf5f34f5aa7f841dd619dc872a212cf9d3f4c2a21eef4e4ab", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive1.tf", - "similarity_id": "9ff674fd4c1d89108215f2de81501dde202d0bbd812b61ca2d3f6c249a308171", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "a2c0962dfe1ddb30bc455409d74cdec0bb5f6270dc34db13e1c35eef91ae90a0", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", - "similarity_id": "aa45110b8bbecfe4f26b3922eef575cf7b6cbe6cab7af1384c21615be13e1333", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "b5d8b948ae86e6c19f4d2cf517109c7544309b145da1060bea87ab910c8ac59e", - "line": 76, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "b9fcf85b215a6791f0022f2556eb62519ce78880e64f65531fed2c0b328617cd", - "line": 82, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst1}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "e55687ee31d44735838f27f843bf4fd3227a35648000cb4bfef50155133a56db", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{vpc1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null", - "actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "2cf8aaadc1efca770f97b345001c6f0190fa95e7ce02cc1588a2106866c5d18e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", - "similarity_id": "b7b19e20c75b99ab49ba05a22f01bf622c53d8e34d9ea9d6994f8bb470d6cb63", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "c9fd34d9d27088cbbb41db3200be1cde9add3b06fcfb2a9a3fe3ffbcac9bb3cd", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive4}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive4}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive4}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf", - "similarity_id": "984377e8134080395f285efdba53d519e77ff043282a27d57bf82b4acc881425", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", - "similarity_id": "982e1352848af2d100c1cf88786ce9227a40224239fb39791db67a6402cc4291", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf", - "similarity_id": "b44214e547049ef913befd33828546a087f82e1da2f82d404e27a6ee486868cb", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "afa43d50a177f29a4a706003eca3c7aab0d1f20685f5ba6e899343e73396fe50", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", - "similarity_id": "4a537f92c39af2b24f69c5d2d2c49ddd7f11d372bf0e254953a3b5ba4919cb34", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{enabled}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{enabled}}].tags is defined and not null", - "actual_value": "aws_lb[{{enabled}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "75f9777570c99ab5547d4497da40f432fafb4bd0c0da16ae3c970cd905682369", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "7c6dda3a73888b08142eece5daef8aed2e391630964731f9ede3c7432a41884e", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{private-subnet}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{private-subnet}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{private-subnet}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf", - "similarity_id": "9dcb841c390a8929c7cb81d0032414355ff366409eb63d444493b2974a3c5d37", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_config_configuration_aggregator[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_configuration_aggregator[{{positive1}}].tags is defined and not null", - "actual_value": "aws_config_configuration_aggregator[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "234f8e60da0d499c4c98e4362d24170bea533db1983a7f655643d14ec800bc98", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", - "similarity_id": "30941eb9e12e564ea70620a40fc2fffdfdbf412c2b1f67cbc12205a472650840", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_snapshot[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_snapshot[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_snapshot[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/positive.tf", - "similarity_id": "6da9cf1307246f14181930af7528366c659d7045350cc83a5bd5f65fc9726f10", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative2.tf", - "similarity_id": "1f8423f3889aad9b2069339841db249da47be9cb7de5f39e048a28becd8cf9b7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_server_certificate[{{test_cert22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_server_certificate[{{test_cert22}}].tags is defined and not null", - "actual_value": "aws_iam_server_certificate[{{test_cert22}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", - "similarity_id": "aae8be024ae2dc00ffeac6cb9018f52f300eb454c897055b7cf7f732fa2c01e5", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{positive3}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", - "similarity_id": "20c8f6c27ec76ef7aba62b59bfb7478e00320f3687506b8b1b9c2960b2aee752", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example2}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive1.tf", - "similarity_id": "bae526766626119cb4241a4ab7dafcd9ea56d606c8a0077a8a4be8190f1ff7bf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive2.tf", - "similarity_id": "018c21605d11540dd3a13a83992d6301d871c23f33dc9afbc8f697730c7dade3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf", - "similarity_id": "0016630a8c34f4eff3a0aaca9e7749a87395959b46f803c0feebcc13093edb6e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "06dafba0889f7a0dfbe15d7eeaa7b8399136eafd147c9dac89065126211ea45b", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "513e22c2f03628d40876f6fe55a78e2d6076e249adf1364ef3434ea1a22aee52", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", - "similarity_id": "1b3654352954d3259c45f249b3a6a32751caa5850cf4cbffb6cfc59d9ff0afb1", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf", - "similarity_id": "488b6284ac054f8288f53f91a33b5b9b66d46152a341cb85c6d946cb28f27a29", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", - "similarity_id": "7fa574ff6e00a8c3e7b9d1d8fe7fb6405cb5994dcaf4c2d7fcc7efcf9afdf0bb", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{negative2}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "1ae11b5c34bc8dfb1b6d7d138c7277a4324168128e335b627272496bdcf725aa", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/negative2.tf", - "similarity_id": "b8729e07b6b29248dde8401df8f2da902196ecba2e6b26ceab0471ff4fb5aefb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/negative.tf", - "similarity_id": "48e394d2b464d1f2da97d1361bdeeb22bc1c5ef4ce4e429a8e490374c90da544", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/positive.tf", - "similarity_id": "cf87a7640cd0e4bff87abe256c4a4238fe3c366ad643537058794d29a3938248", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", - "similarity_id": "a5b97d1e1c1f33de962232b376287796fd3d5e0bbbce702e8aeac1a39f1e80cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{disabled_1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{disabled_1}}].tags is defined and not null", - "actual_value": "aws_lb[{{disabled_1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "9be721d034a88551b79b7a398d01c81f3306365b98f2ff1ff5c4d9fd48098df5", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative_rdp_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative_rdp_2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative_rdp_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", - "similarity_id": "7fff89cfcd942ab435923c62da6cefde6ddd4fdaa81d1780e299cfd1a20646f5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{b2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "72ec12b487c7e9d3dd1e68580dfc5c974a98665278f3b1164880ccf14f86c421", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "e6dd823caf7a585dd7b65f62855a57a20ff57c92aa0beb81a8bd8c648b47404e", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "281d707fc8f4759d51c817fc8ab0a0be8ff772c3ec5839abc94a063a5097d074", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "5ae8b018575d04dd20b6e8e9440e73da7cc148ff384e5eac3e9e8498e7827d55", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{public-subnet}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{public-subnet}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{public-subnet}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf", - "similarity_id": "a0eee800f0535ef372677f08318e4864315e62f73d1436dbdcecf33d73c441e7", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_config_configuration_aggregator[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_configuration_aggregator[{{positive2}}].tags is defined and not null", - "actual_value": "aws_config_configuration_aggregator[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", - "similarity_id": "833afd15f489ca94f8359c3ab68974879c9f6432206fa58e45403f38bf62cdb6", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", - "similarity_id": "384563f2000b97b49c76c0b744d6f87657c29650bc3aaacd7d698613b494940a", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "3c7f7e1bcd73f128dd48e5b415f62bd2ffc62aa6a173d36305e31ef0659a1ad3", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", - "similarity_id": "8df4ab9d742dfbd7d76985f1cbc05ff9304bd86987d259c892761b433889c44e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{hoge}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "22c49b122aef8aa6218731b03f2fd0d2c6bf84e0cf5b7404d13b3b97b1c2c935", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", - "similarity_id": "a367c223bed4b262eb59cca637b5ac9ea9efa3179ff7aaaca4aef6889d717bf2", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{lb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{lb}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{lb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "2ee4037e0bfaaebca4de967bd0036ae1e23a1f4bf0fa8c1d70447102045ade7e", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive4}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf", - "similarity_id": "59fb9a79d5902a0a2f72436900db7bdd09cdb7b9d3631fcc7a1fccd62d7c1ae5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", - "similarity_id": "3834c9adf8937618934f261798ed8c0fc29537a0d215d89901e8e677d46d17ce", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/negative.tf", - "similarity_id": "0cf1391ca55a0848e6dcd111bf16c344c999b5c98f1b27866b6206d67bd5756b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_guardduty_detector[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_guardduty_detector[{{negative1}}].tags is defined and not null", - "actual_value": "aws_guardduty_detector[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", - "similarity_id": "833c6c3f7c9ed303a2e1612a4e6e7cc9ed2f10abeddf41b6b10c2ef375645f88", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive1.tf", - "similarity_id": "30572ab291cdf06c53feef4a67c31936710a3d67070170d90e109ea362a34204", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "2dd4f8f95eca6d6c33c448f433f98deeebf493bbb936113e3e3f35cf51d0498a", - "line": 86, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "3b52be7ccd4384373ae53b5a5c8ec90d022e3dea5d32aa74da9fda48131d0d84", - "line": 96, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst22}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst22}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "c114ffd1fe9e71076ebb5603a4029e258720b56be6654d604182b38455ec95aa", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "f8c357fd2709f9cac5ce2242168c25cda405d166748fdd439ff2874beebaf447", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf", - "similarity_id": "693c6b1b83cb84dcfc101c911b27826411c5715bf85cbc09ce92708485b839cb", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", - "similarity_id": "1eef4bcea4ae9f3a6acb090ab4a90f351e0e6ad94369b99eadf218205f82b508", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "cda229e77ffdbcbed15a49f4a9f3658b751bae35e0c6922c00a12679fc7ee9c4", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf", - "similarity_id": "6affd9e757245633559f25f56d3fc5bdc492c91380dd1face201c5fd701a2f11", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf", - "similarity_id": "13c886cd1452109a92b483cbb46860b8f77d2240f01348a8fdd10291b93b2af3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive2.tf", - "similarity_id": "3d08ddfd925693ab1c9c32485d35808588ac6d9abc1ea02ccdd49bac13fe10ab", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{service_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{service_2}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{service_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf", - "similarity_id": "fcd4fa42ff7d45e41e3f1b91adc6626b4eacc885aade0306a59e86c19834a7ca", - "line": 20, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user_two}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user_two}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user_two}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "f22789d04b8b1403818e4a411620937640f2b021874e9a62798db357ba773dd6", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{public-bucket2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{public-bucket2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{public-bucket2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "4332ace44f5e064a340c8373ae6d0243898f1e4770e5f060a6d4de9c9ebff5b4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "14927b7e021766d6a67464303fee04e8ab8360e7114086f20899791b2da23c32", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "a7d173569d7a016917bd5939a7bf51fef6a84ae3c328f47dfcbd38fb5d8e0fc1", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", - "similarity_id": "a6f97695d5a67f026b54b6737b70b7f02010bbd87714c915119fa0fa44aae6de", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive1.tf", - "similarity_id": "9f1e1a96a296750c993eb4423f1963e5ba213e06d7f8a30adf9a8af7809773b5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", - "similarity_id": "ce2fc142c4e77729ebfeeea61696cba28fd40b476415f9dbd02e9686ae8d71da", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", - "similarity_id": "4f44335b78daf819489d6f3631705ee15f67ae857c23ef9e59643fd4bfb16977", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{positive}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{positive}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{positive}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", - "similarity_id": "d804240d04d6e1dc57142654b2d1e8345d1d9addf7be6d8d47fba607c0d20879", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "7b30d19f6b76b71271db841a6c68752d006de9f41d3800af8bc570a7cbd38039", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "c662a1c3aff2e5d8a1a08ecf9c8ed67f9f62b0455136fdd9846ea635d653f11d", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{test2}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", - "similarity_id": "587d003f018d259d59ec27cb0871858678c6118fcf41b4b36e6dcfd1aae1f40f", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive1.tf", - "similarity_id": "d7b8a6817257fe11d9e53c30fdbeca3deea30081a7e5d8006fe1b6a257244c7d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{service}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "cc04f65894ecccf45706ad5f1bca8f368a9b7c97c13299574cc96166565e5d32", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf", - "similarity_id": "d97372acc69a3fc7cb235309877d6da7eaec1b19d082109142aa662089cca0ca", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_usage_plan[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", - "similarity_id": "b5053dcb7b2ad6839a5b2f498153f3ab11a56394110970dcf6b3fed99100cc46", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_athena_workgroup[{{example_3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_athena_workgroup[{{example_3}}].tags is defined and not null", - "actual_value": "aws_athena_workgroup[{{example_3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", - "similarity_id": "b07f5d0e0400b24fd67fd6b7f400b254ffc99cb9cb52cb16ff7d0b70a979a1a4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "bec8b88dcdd7274c0913ae55ffbb97e39181735b7beb02cede22aac4a6afe55b", - "line": 50, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{public-internet-sg}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{public-internet-sg}}].tags is defined and not null", - "actual_value": "aws_security_group[{{public-internet-sg}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf", - "similarity_id": "88d3c42ad9afaf18587c30b64e87e361b6e663520c45d5dc53f6e31d0196aa44", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "e4570226e23eff95f0e8092718eff2b6b165ccb72af1615709e124d653ee273b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", - "similarity_id": "1ba0e13f7133e120992d54567c8a436cf1c709b653a3c8a04a2c34b03f52704d", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_apigatewayv2_stage[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_apigatewayv2_stage[{{negative2}}].tags is defined and not null", - "actual_value": "aws_apigatewayv2_stage[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "54431b4ba109f780027bb657a4b01e3bf5fac5618443d38e7f226c1e9549955c", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "79edd38fe37cad070083c72c6c661c1bf760dcdae8c41cedc880daa41a7a1abd", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "620489c70fa3399b9a537d08cfa8225cfb43d3aaa5629d47b3bf29088c98e56c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/negative.tf", - "similarity_id": "80ee37016638db5b66f2bbd4535df12b9fb7b014bba793b2407c86a45d16497e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf", - "similarity_id": "2664f51812f69054da3e0d27289877929dce48dc24ebc3ff1facbac211825607", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "601f093f973a6a58c312a2ca5d41f76b6fcb08f132d9a1de86abb7625e5c03a8", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "6e69cf0147859cdf85c98abe63c36358c5dd505b88b657041bf6495aab32a05f", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{priv_ins2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{priv_ins2}}].tags is defined and not null", - "actual_value": "aws_instance[{{priv_ins2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "c5876b169aed55a45a3d6baaa838ae7089f6e3b7732ade59f743367130d863ef", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative1.tf", - "similarity_id": "de004ddfe8d1692f19f09107d29c4dbdbccb706646afec6a76f16698e59b1ebd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example3}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", - "similarity_id": "32209efdc9044e088525b422321326c3a6d649450837968a06984eb958841ef2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", - "similarity_id": "77fa4e7bf0c2ecf023209be8b937aeef6d09c078ec2804c53fc9806a904d7426", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "74ff7ba80ed7de629006cf6ae6088231c0c5bea9d025730d558eea523af280cf", - "line": 109, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst32}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst32}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst32}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "e1e98cefb5daa25c81cb08c90b4a4255937ebe2f08666808886d2d727ef3dfc7", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "5a925546150e29169991bebbb29441a61d21bf295d40b4c9634c0666c9a8c694", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf", - "similarity_id": "37c91425efaf2005266249ec1202652e66a5f58a1fcaf6a3af63353b938fabc5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{mainvpc}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{mainvpc}}].tags is defined and not null", - "actual_value": "aws_vpc[{{mainvpc}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", - "similarity_id": "b688aba31df36fda9b0c1d60e06992e6dfba6669e3660b7e766cfc13e29dc07f", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf", - "similarity_id": "cb38517d1e890b302216b8969a79d6ea9d572fa992fdfe20672e03c9c4730c8a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_route53_zone[{{no_query_log}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route53_zone[{{no_query_log}}].tags is defined and not null", - "actual_value": "aws_route53_zone[{{no_query_log}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf", - "similarity_id": "532e0628749b35e62484dc3c545e44837379ced4f5bf21b6981cec7544c1c255", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "83a3b5f34b9eb8e11879eaf2a664596d1d42178e34b09295dace03de04d7f347", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive7}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive7}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive7}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "d33885b4752c1cd6deba1a99a227057e340558dcd42e82e1bf886d1e8cb7562c", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "6c7395a794baba6c9988754065c2b636ae9956b4145496903e4ed1bfe4aa4bee", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "41f4819cf71faa08ab8c1e7224157b0b08896bf5b42a8cbb3dfb4f8ca4315655", - "line": 49, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test}}].tags is defined and not null", - "actual_value": "aws_lb[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", - "similarity_id": "09552c9d72f4901a6c27d4166d11507eaf9c7e09f17e0c57a9af37c28b5d2b22", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "ce678c19eac6251be9ac636c6c7e7f31f80268976461050404fa6beb49e28ba0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "aa1d0d9fd6d2fa93fa7ac9435af5359b3fa52539a4d4ce0751205d5399bc04ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf", - "similarity_id": "7942fe4ffb05fe2182a7065baba61b75c5fef5ffdb8af42eaf47dfe0e6161ffb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", - "similarity_id": "7e2cd7fa837fd18506c14769af66dfe98805792005b0b4e118ddcb7b468f64af", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf", - "similarity_id": "2de1f3d740a1dcbbbe19277e30c68fb82317786adc25dfd67dd872c3a969d180", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", - "similarity_id": "1fc945ab6ee52928421a34739f7a32babc4350d8243f5f44ab4b31aa4b3561c1", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "d326a8dbb9f5951b20c168526f136dbf556f66c563152e3597797b44b66c111f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_cluster_snapshot[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_cluster_snapshot[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_cluster_snapshot[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "521c81505724383bfb5396504d5ebd1d46fd841fccfb65efbede5b7d4406b780", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "a8e36842361b20aa35e38ce880f19d44fdf6bce0b8e25777ed5007cddbfa9e31", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", - "similarity_id": "b9874e27be7e0647d7af01881182ce65386a74f7271f4e1a9a2762197b761c75", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf", - "similarity_id": "081766e2a442d300fc35d57461730db9b2e845d070016bfcc7a1e9a50154f590", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_cluster_snapshot[{{negative}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_cluster_snapshot[{{negative}}].tags is defined and not null", - "actual_value": "aws_db_cluster_snapshot[{{negative}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf", - "similarity_id": "d785261b8dce77ade8a40b5986bf94213399251f92b9052f778a2ff484ff75d2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{positive1}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "0dd80711add1ce6378403c30483e7369758f34744d776c49f353283172c8c356", - "line": 91, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive7}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive1.tf", - "similarity_id": "cb9462d2498c9b18719f6b211dad05fb729f09d97cec3c112e371e97b622f414", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "bc329eca221daf5e6014092ca2157b910aaca4e2b0b3882e8e610899ea8af0e7", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", - "similarity_id": "3195f78cd8a542e0cc2b69e0c612503af894d467018cae708dcdd45190156146", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf", - "similarity_id": "bf6d88f277325c7349fd318c6e8c81adc9eff5752f89325c79dc030d45f227c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{enabled}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{enabled}}].tags is defined and not null", - "actual_value": "aws_lb[{{enabled}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", - "similarity_id": "a16d5ea1a614053a724e936eeeb384ec38d66281c71fd63bfbd170dada7a3ed3", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/negative.tf", - "similarity_id": "a175058a62776680ba122746d3246d3a6eec4e31f308a6b6a0f96c0d6638340d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{fs}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{fs}}].tags is defined and not null", - "actual_value": "aws_efs_file_system[{{fs}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf", - "similarity_id": "53ed9ee035d0162c10c3e8c08c3b725ce8a5762f69b9b37d099eac76e6246a5e", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "2f1f1c31fcfec200e1fc9859daa6f8af2b03b7a0ad0acb538165c7b95965594e", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative1.tf", - "similarity_id": "5e09ee363daca360c6150982522064e3604df8aa293909a7a8ecd3592bfd96be", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "d1bc013d22bd9b431fd0591e9dff453dc4d7a9d2c4d72327a991f24b3c155fed", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "160cb5262627941db1594fb9e6950b0d97f90fdbf924898b6f63720cad1401ce", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf", - "similarity_id": "3b40f0da0d97d24220cb0b37bbf35c02a473475326118f652f3cbbe22c88419f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redis_not_compliant/test/negative.tf", - "similarity_id": "35533628d428fcf760e95a652fa5ab00a44b8083567f688fa278b6e34614a825", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf", - "similarity_id": "1101d8de10e40f8bd4dbeca5395b916a9c7ce5bbd2cdc01acb40c9738416d215", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_has_expired/test/negative.tf", - "similarity_id": "0ed3a66686058d15e17422b4fbb0548bdc5b799b9ed5e9b87d6e3600c88b3244", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", - "similarity_id": "56bf6fcaa667c64d1719827f23d2c395b6878a2d868cd84156ddfa817a1f2797", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{disabled_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null", - "actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", - "similarity_id": "d4ec6345adeac1d529ac8db293520337be2d1318aa7e50352d3bd172e403f445", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{hoge}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redis_not_compliant/test/positive.tf", - "similarity_id": "20b4570b5e4a26efcf5f9bed289236093b7b46ae1c9f5d98b72ff93a0b2664e2", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", - "similarity_id": "e3b56bc8117c209f761a5bcee62f3c87318383c21502a59b597214ec673bff87", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{b2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf", - "similarity_id": "949a306a3308f3a06467af8857db125a7306d4c40184feffdf0d3d4009e9d8fe", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{mainvpc3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{mainvpc3}}].tags is defined and not null", - "actual_value": "aws_vpc[{{mainvpc3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "33b3deef328bef37410c6c04a01b0fad8daeb0a0bf531a592e4ee1259a295e18", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative3}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "e10ad2160d6ac745089e335b6cda69dd13c9a826d031035bb4aafdd5e8aae0cd", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/negative1.tf", - "similarity_id": "3c47dba1e9846e327a128b578dda73d118f61110f2d4df03bb7d450d10e349e5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "a9c98a90172b03a72986a5a934fc73672f08fa82d9e1fcf2da300b463bd98773", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", - "similarity_id": "8d89f8b1b51323d94d21e4fc36308492021da41cc8d95749bc80fc133bc1a8a3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive2.tf", - "similarity_id": "5000c8b54e1f5c18de4cc7dc43cb5144d8000445b21f51260a0155a171b5fdd2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example2}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "0485215ddd3b48d8026419cedc469648bd50e6c07a621a08c0b4e31f83f806a9", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "313358e70211b2aa3542a89e1dd0146dcd7d4db5a614befd496f95909166ddf3", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", - "similarity_id": "e2389542084f3ba7348468fe067f1023a16a93289872cc859925bd75aae5f8d4", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/negative.tf", - "similarity_id": "b5344e5f0dc48937a3c8af22cb5f15583372a82741e0efbc868c288725105f5a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "f7962d8c5aa507889fcd0615c483817c5724e8cef9287b202f0a4f4d86b7640c", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf", - "similarity_id": "880d9fc9b2f770a9be7c1038723c1956b4a6d38878bd1e6583d889dd4e4a9734", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_config_configuration_aggregator[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_configuration_aggregator[{{negative1}}].tags is defined and not null", - "actual_value": "aws_config_configuration_aggregator[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "50de1f16ce95091bc912f7ba8841317ee874a7c2e9e262054c31757297dd6685", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{my-lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{my-lambda}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{my-lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "7c871a31272c4ae39136cc911630e06f635882cec88835b888bcbee00635f257", - "line": 103, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{test-queue}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{test-queue}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{test-queue}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "87883982047b5e857bc246bd8e71e8e11616b62c965b75047f9b8e4f8cce0394", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "57b4362f2c9b2c41b471e0e188c115a892736b484e94586a6ed9de446f41112f", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf", - "similarity_id": "87552b3ce68c7e991e907c7249c54ac17a4f495458af641b3aec9702d98cc05c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "140a94d77dc6e84835f595a6fb50fc2c9d79bd3b1f90824063ce58295923e812", - "line": 28, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test}}].tags is defined and not null", - "actual_value": "aws_lb[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/positive.tf", - "similarity_id": "50b0d6121f1baedf2144e03de9d1b6c9ed9076cc397ad685f0d4441af04d105a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_batch_job_definition[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_batch_job_definition[{{positive1}}].tags is defined and not null", - "actual_value": "aws_batch_job_definition[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "3a7740697e63500d62666816c41095685563f0030ade329bd195c161946c5f3f", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", - "similarity_id": "6974389fb3d7caabbc30c6aa1659b4645da99d463151f04b894bcdfac89a0339", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{positive2}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "c0ddebf53afe007e0bfe45c1531d1a3f2e837471aa5b9aa28efe0900521837b0", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", - "similarity_id": "87671640449d67dc448eb5bef9fd3cbeadcbabf94706084cb37b1020a7d5f9c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "3cb28a46a92d9ec5e58b4c81cc1b7ddfc2f153703d6e387dc91b2f26b6ffa60c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf", - "similarity_id": "94bd70f63e5b28d52ebe2a594a5a6c8e91f45a88603bd3bc7acb92f2de8908bb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", - "similarity_id": "6641f2907e698ff4339895c7a12ff6449aa58873d52b42cfd8d58ea58ecc10a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "e64bbb0a3a0becc5cafd664fd8e62609e2d9546a8ec128b9c8cc28a3000fc2a4", - "line": 40, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative1.tf", - "similarity_id": "0bdc8f4e6320805d81e6e8e22e49b375132a2cf2ffd25570e78f08e8611ca657", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{secure_policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/positive.tf", - "similarity_id": "df900952faef7848302a280a53960a09dee624ac89d009415f5cd16faf0ba3a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", - "similarity_id": "b57a9cadd8183f300a98687aba9372f8c58d400be75d5a297c46776148490535", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative1.tf", - "similarity_id": "550a00588b31e605da782c1aa8b6bf2bb9e2d902d523ec40f90189008403366d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "8a622b3a313decf89e16ae1d5cdd5ccf83e7cc1bad2b672e82447520294cf99b", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "a37f57eb3663501b2807b523a87af9bceefaeac497d97ac445563e88d485c902", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", - "similarity_id": "f7a4bdb1d71f1d9fdd75a26b69ba5374136cfb14ea8b908d338e65540145582a", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive3}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", - "similarity_id": "dd87fa508d2dc1164be7b6d4d6c0cfc328a931d8a13f472064d33d9cde4b4bfa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "fcafc04f0436f043a3e96f82e5781d5e6fd8503b19f3fe7ec8fb2cd281ab8990", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "21decdd58927b41d4a493e3983846b6452ade1efeb092a674a1cece45ed0148b", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "b30672d78bbb6838e056bd11b4314ba3e07bf02d1d973fb3841b5f2022697aa7", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", - "similarity_id": "4851daee2c0d1a898e82f67d87c9ddcd3727506838b9d21d49ac092fec7dd1af", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example0000}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example0000}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example0000}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "f2e8d2e11b10be3f7b6b6837fdf37435c09a90d2150ffbceff1359319fcdda20", - "line": 66, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile4}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "87be0de6ab2fd60ca0d74fecbc385e00289636f864877ebe9c0ce63ecd82ef07", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/negative.tf", - "similarity_id": "0e4d096b9e40efa9af714d4561fcb748406d688259bb5b87beddf38374acd29a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "f03baaa27f8c837d97fdbd9d3e194b604a286b5bd4f8c643ea50ace15cbf622d", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive2.tf", - "similarity_id": "87243a3303da420997d3d18fc2a6e27a0071b5931209e7c27cc5b095c99e8cbd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", - "similarity_id": "52d6ee7fb5aad8b7620ff3aa604aa51e073e1e2c2aa0f8521ade710451affe4b", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "7bdb3b505e086a8a9ff635fac05bc14c989e8cc78caf5fb32f6da520598efe8b", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", - "similarity_id": "80c078fed0ecee71812797bf777b736c7939b9c09aabf8e612bfe7dfdee0aa52", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "e54023286799116b5615729250c77cd94324b2838265d1170002b8f1b928006f", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/negative.tf", - "similarity_id": "b96228815033408893ce8fd1db2cab1aa22a98d6e7a15695a9ae1c6ac2dcc8f6", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_service[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf", - "similarity_id": "7b71d1bbf0dfd7d94acc74db6a744ba4b63a5da80f047a0e0da35169e356068e", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'", - "actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf", - "similarity_id": "8781b118e92c6cb375673038a3b0c6fc45fe8ab85fc45eda36927bc77aaac83e", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_config_config_rule[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_config_rule[{{positive2}}].tags is defined and not null", - "actual_value": "aws_config_config_rule[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf", - "similarity_id": "7009c367e82c41f46df83dc6debe9d3773acd115793e6be228caa5b25f9d0bac", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf", - "similarity_id": "5bfe6770e71dc946ae0b8ee4820c83a84a1eb5f6fac48784fa1a7ec9f915c53e", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_config_configuration_aggregator[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_configuration_aggregator[{{negative2}}].tags is defined and not null", - "actual_value": "aws_config_configuration_aggregator[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", - "similarity_id": "677c8278ad8600fc8674ba7c9f975f5579bca11214be0970253b6d544371a808", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_apigatewayv2_stage[{{postive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_apigatewayv2_stage[{{postive2}}].tags is defined and not null", - "actual_value": "aws_apigatewayv2_stage[{{postive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "302075dff2a31fc6bc75e9fde67f1a221088d5da68ac01b51013ebd96815eacc", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "ae93eaa8e8f54e1bfbf1a4c0ad5de0151e93aef56e732de444da3d9ef9172ca6", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive2.tf", - "similarity_id": "5a9008d0d0138a984503ca53e2f51e478fe6cfde4178142bbe30051dcab2d506", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{test}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", - "similarity_id": "08a2d4c9429eec1283d35f14ed8e628c487a92fc2ad70fb90bb50a318e5f796c", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_acm_certificate[{{cert_2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_acm_certificate[{{cert_2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_acm_certificate[{{cert_2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf", - "similarity_id": "7a132fee2deb850f513fec0e5a8c05b6ad272a836551874715c2206d142e846e", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{example}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf", - "similarity_id": "e99ae1aa232256214d6ac75f69c61d7ca59e958b16a587363f151cc8834862cf", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "b89a5d79bd15d921bcf23099a523c1cdcd64077eb6bd136b2808adad61fbe66a", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive5}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive5}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive5}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf", - "similarity_id": "75d2b7920b52c18409959bacb4fc583cdce0017ea304566c0dbe5841ee4df2ef", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", - "similarity_id": "6703a70ede7cd94c9d9b74bfbf4f6d63ead29d11a3ffe4489a08044cdd4a830a", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example000}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example000}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example000}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "5169079fcfb849c9e81452116aff756bddde8694e23ee2c1c0402e8fe5849d98", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", - "similarity_id": "692d8ca81cf118529c0c61d2cee69fd0b470b73ff90a4cd7c99c58374af3bed0", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example0}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example0}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example0}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf", - "similarity_id": "d286ccfe47ef661cf5cd889c56839865a27f821ecc85d02b1ac5bdd55f095a9c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf", - "similarity_id": "2e8928c15569c8f1ee1579fc9e6db4c07a800a0d85d16c3a194b1750ff68615b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", - "similarity_id": "dd381de9d3f2bc4b9643ddec720880ab11f591e257e3ff28e7686820ed54614a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/negative.tf", - "similarity_id": "8a0f0afa6d548aa118b6a82ab18acf19588e25ed746aebe0759b260947d28235", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "1aa77ed9f6defc4e886074d8b19fb827a1f667b9397a84bd9a4110ead7dda527", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/negative.tf", - "similarity_id": "c7dd38d64d677270b9d504e080b48d7b439df8baf778d722250919b2886bda46", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "a79f146a43d4456332e8f82ec105c95ec0a6ce49a09c108290c01c94be1f03e1", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{example2}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf", - "similarity_id": "72e78cbcd82758fb522c583f9f26d59435066cab71316569f7c421ea9647f438", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", - "similarity_id": "27496f8453c01af6020c31c0f8bb66adf340d2d9831d5292e1c2974d17d95dc7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{b}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "32c367d0c6d39633be995a1b5fd139e2837c1a0e6e8056ed97e3b1619067256d", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{api_gw}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "19aabad4f15ebeef176560b97edaf0d8ab5f14a0c3857189c9df8857c2d2bf63", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "3e306bf41f303bc2fb3a70159ebf6ffae3037a5590853e4aacb7e92d40f6ea85", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", - "similarity_id": "414459e9120d1c2db94e518f0f39d10e05573c63fc3c543dc47823402d7f6527", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive2}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "7ebc38adfd68ba928e8b5f1a4559b703313c81ae00733ad8fc526b63633ec478", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", - "similarity_id": "3574319f06ac50530ea75de41741e64a27356835774538b286dae3568a0925e9", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", - "similarity_id": "06f473420868c8e813244902937352a115c34e523bc9aabcf2c7ef88d59c6ba4", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "44fedd3d0e9852f493cd03729c9b667c94955bba75eb872f309f8b9e527fbe3c", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{log_bucket}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{log_bucket}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{log_bucket}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/positive.tf", - "similarity_id": "04c54fa534401d08b72cc021c163b00d3f7200f7f03b3daed1e830447ba22291", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "224ef00b57315cbee0d10def11356aff91941d6bbbf433be7ee821649d472659", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "88dd6632bec2e94a42a6ecc01280c615ef11760dce5e111be53f09f00eb4385b", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "9f5724024ac91244a6b54b8d3725fa967f989df14d26c1cf055d8b3768623a1c", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_route_table[{{private-rtb}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route_table[{{private-rtb}}].tags has tags defined other than 'Name'", - "actual_value": "aws_route_table[{{private-rtb}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "0062acffb52169c9082bcd1a98ff5f7a87cae846e534a050c1c6458931330c47", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "9d05f0f68a5dad58d0e792151ea1214aeba6e193f2030f558479f0b73c06a5be", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", - "similarity_id": "f14eb8ec31b04320c7e7b05ba8c4988cbaa28665dff7fb317d8c855b6eb02f05", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "76047c4a4e7cba58c78b4c22801cd82cc7135c2cbe7e0a55a346b24091400479", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{example3}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/memcached_disabled/test/negative.tf", - "similarity_id": "49100f90b87e61710dc47a0165e8d552e911bb53a394c9a9021dfee6d579b201", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" - } - ] - }, - { - "query_name": "Security Group Not Used", - "query_id": "4849211b-ac39-479e-ae78-5694d506cb24", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group", - "severity": "INFO", - "platform": "Terraform", - "category": "Access Control", - "description": "Security group must be used or not declared", - "description_id": "eff2383a", - "files": [ - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "b34de59e36b34a4c19518a6e1ec353aacc1f0e996ad2f68c77b4c94aee19ef66", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "dc28977b6fe46ebd23c1da788a21849794afec7ff88a83ae7e4b568f0cab2b44", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "47c5bc4571b7341d7d35f2f25d310a7770c8247d2c18651b2ef273702d73da69", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "cc14c34ecf0b1d52eb75640a2c6575a5270c8111a859a95b4f1c90219a98e1aa", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative_rdp_2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative_rdp_2]' is used", - "actual_value": "'aws_security_group[negative_rdp_2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", - "similarity_id": "e849a2f5e998cba335bcfcc448d76a78a6d9374280b64e281181b389edb05877", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "1079df6156741ed31a5989b95d98656352ab73401116dc8c24e58e470479fec0", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", - "similarity_id": "0f0900a6fc4525d5f829110cd31568675297cd052d7d5614190d743124d025be", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "216dd7f494b888a497c227775ce036f483511eb7dad48e8cc2965dec635fe372", - "line": 58, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow-public-outbound-sg2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow-public-outbound-sg2]' is used", - "actual_value": "'aws_security_group[allow-public-outbound-sg2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf", - "similarity_id": "e55e34b27f1663115f9727fd9882dfbf8aaad2ff02b8acf0253027acb9acf16f", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", - "similarity_id": "fe7d2e8a70f2026b00b3fad43a6422b112ab7784f7e176de463dc85a211e2887", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "a91e0c532a2e0506b42ebad34088f61e924948d45f684f5af3f3af1a44d98191", - "line": 76, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive6]' is used", - "actual_value": "'aws_security_group[positive6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "9549b66a01e7d1b081807d3e10352c06582891c740a675e25ed1beffb58193d5", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow-public-outbound-sg]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow-public-outbound-sg]' is used", - "actual_value": "'aws_security_group[allow-public-outbound-sg]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "0c4b0988118981b6dafb6daad599122a0d8326bf0c7b44f8bc97c8260b97acf5", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "8b4e32fbf123be0405ac7075ed7c1edb6764a03a6c0f600e0bbd043fe7fd5f30", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "e9246e7ecd3569fae5a0663289fa276575bb8d768221093447162ab7ec4cc18a", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive4]' is used", - "actual_value": "'aws_security_group[positive4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "651ab242e3ed0e3232e9ecc1338bb81c13a04cb6d5395c6dcfaae561e6ec3747", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "9119d6bf141f7ae79f599c17792116ce832a1e31c79903f3470a4121148e65e8", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "b09959d54b5ac1e3d7dbb0cbe0f86f688ca480ade3bc4f57222b8710cdaab200", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf", - "similarity_id": "b0fb6463e23378a02e2e53c337e1b1c2d991cf371bdeb9f3e6480f437c6fa250", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive8]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive8]' is used", - "actual_value": "'aws_security_group[positive8]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "a0a3139505f7bbcd611f4565b35010aed1622a591f24f4f840f290702f2f7c3b", - "line": 50, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[public-internet-sg]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[public-internet-sg]' is used", - "actual_value": "'aws_security_group[public-internet-sg]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "0b14bf9f8abfe6aa8342f5061208b923a5fbaac7f4690a4f648e02bddfe75d25", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "a09497235def90f1eab9bde9aaa2515b8445b2e6f1400dd4b7cdcd19e93b8762", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "c635380bac05c17e10f99691ed4255aec4ca1abfa4be40e2f68c08faaf40e0f8", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", - "similarity_id": "cd1febaf834c4d8ec3af6c2564a91cccc9efa56a0758769565d01189a25116f3", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive3]' is used", - "actual_value": "'aws_security_group[positive3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf", - "similarity_id": "92b08ca77f922f792758fd694e9fc60488e6f22ee54ac6271e9a4a666a588095", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive5]' is used", - "actual_value": "'aws_security_group[positive5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", - "similarity_id": "ecda9b69ab0e79a39243a5e0501cf01d3f5ccf44d92d4b78c743f5e4df5e05f0", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "910c495a10ef47ae63670f61e44a2e7b241014d2c94ee66aca6b0bcc4091fbc9", - "line": 76, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive6]' is used", - "actual_value": "'aws_security_group[positive6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf", - "similarity_id": "8822ed74f1b9d332752c9ef43df283f1d70a4f7e813b566daf7e7724ace7fe8a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "a2bd20a1fcc7064cdc9668ce502200a7232c2e493cddc69a428d69886c4afa2c", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive5]' is used", - "actual_value": "'aws_security_group[positive5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "29b69e4c381ab151863df423323d370f2dde43322ec602c61a0cda9bfb6e4acc", - "line": 26, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "e84114fdc3e07676e30a9a18529cf260ab319e3f09c638e28e108ae7460de17a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "0844f97e566c95a7a7a29e760a31e011fa8ea2393d2463649543b83e12dcdf7e", - "line": 2, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf", - "similarity_id": "33dc6947723d8c375d323a85c0fb359e8bdef2064fb8c55bf58473b2457f6c21", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive4]' is used", - "actual_value": "'aws_security_group[positive4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf", - "similarity_id": "ffa16e12728f9e0505e07000dd4fe2222ca948da262ba455b40a96eacecfe67c", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative5]' is used", - "actual_value": "'aws_security_group[negative5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "b5d2974424ee695207aea177f2cb0564e43e9557aff46635ee90b1b20631d2c4", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "d322571bdc80e01ba976aae4f31d4f0cb4077aa7037caacb0f3e6a9e9d2360cd", - "line": 106, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive8]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive8]' is used", - "actual_value": "'aws_security_group[positive8]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "ba7b211e54bbd61536a9e92c90493294de1b3e795db86cd6eadb70496eb37172", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf", - "similarity_id": "85550e4d81596ef63fac7f8b73c8be29469e750bb4f79eb25d46cba32ef8075f", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative4]' is used", - "actual_value": "'aws_security_group[negative4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "4b474e5eab73dd28051e418f6d88d3ba6603074cb502dd30553a2e497cd4a875", - "line": 76, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative6]' is used", - "actual_value": "'aws_security_group[negative6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "970b6ae9b54bc9656952dbd86602f6872f9ca2fda1e337238b0ab239c696cd09", - "line": 91, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive7]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive7]' is used", - "actual_value": "'aws_security_group[positive7]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf", - "similarity_id": "9e503201ba640d6a6a0036ccf71576206d33dc737878f95dfb9dfa5669172a2b", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive6]' is used", - "actual_value": "'aws_security_group[positive6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "44144dc84cc32ce00ef6081cac87492c058b862dfa05b5e0947a3866640200db", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "6fb86ee07fa3ab4a26faf6ed504b5e31f5312329e7712be3a5aaba49baa5473b", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf", - "similarity_id": "1c6871ace99b13429234ecd360e86d39ce4b5560b94cca1bd33be9ef50c4acb1", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "8802e064969bc916d4ef02f06c9c47892d2f3bb4eea6c11aba564085d31d424b", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative4]' is used", - "actual_value": "'aws_security_group[negative4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf", - "similarity_id": "bd267f1f2745ba7ad91ebff57611c6c9e54fd1321b8dea14d5acca714207b4b6", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive7]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive7]' is used", - "actual_value": "'aws_security_group[positive7]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "abd08f520c5633eed72885d441db5a5936387c4ae3d7db9c60e9872bd777f4d6", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive5]' is used", - "actual_value": "'aws_security_group[positive5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "c95c36535d0a7df2c176b0810f6e5d48a51f4f579f2a67e68cd3d2018699a00a", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive4]' is used", - "actual_value": "'aws_security_group[positive4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "ee144dbb3085387c863df92f0e41c0edd378c451341a233093f83b4be1ee2539", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", - "similarity_id": "9d9754ff06cafa80f5475027c863e8913007c0d76626b1180a5cf2d638996b67", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "ae737bb212b1cfb8a2c806120abb34711cbc63025a8c15487961dd5801395414", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative5]' is used", - "actual_value": "'aws_security_group[negative5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "8ee3d3a402aa43b6e3f2cf54c44bd8fccc285e9a0d0bf7749fdf16cd6af15057", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive3]' is used", - "actual_value": "'aws_security_group[positive3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf", - "similarity_id": "1b16280ab89e00b2f2c57b95936f5a209c7d76840fc62ee9e39618c4b13adf1f", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative6]' is used", - "actual_value": "'aws_security_group[negative6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "474863073ae8b9ecc66d74c96204b36a3c0a32a18265bb861fc9691c62cb5ca4", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf", - "similarity_id": "3d7d71e2acd96134a31a44c4888dd582061f87e9a4296654a353724b54e4149a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "bc83bbaaef7e527400c6f92f17637ed599e8ac54e48d4fd51534190b381902e3", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "f4c4b1830fcf0beb1dc337de174fd08fa644a25dfa5f85412ebe61502dd8573a", - "line": 76, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative6]' is used", - "actual_value": "'aws_security_group[negative6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "e93ee550ce0ee01418b4a1c02a5e048a807c14670570c7512f7ab5d50fd4a274", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "7e073fef54b77d57fa937bc30efb9239c7ca635f391827f864da47aca36ac61b", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "8f046721e55cb8c7c1d792300e6509f2765fb444819c40fae9c3cee98b3ea794", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "4d4a207a6527f23a4692690dbb93ce8956dd3262df1bf934e6924e0bc12cd1f9", - "line": 91, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive7]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive7]' is used", - "actual_value": "'aws_security_group[positive7]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "73f99f67ba58819a427b3ebc2195436342b23865ad1b69a96276d71f43801826", - "line": 106, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive8]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive8]' is used", - "actual_value": "'aws_security_group[positive8]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "36165878b6d660e01bb0e87cf7c9d160084eede23de3db5a5305ec2882bf6389", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative5]' is used", - "actual_value": "'aws_security_group[negative5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf", - "similarity_id": "59f6892722fb687fc6e9146824f4083677d37b4ce4ae2d1bf3001b1566659e08", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "b07dd9f1938ae90bc88bb632d5005d911ea42b641ade6af94d3bd966a9f9a678", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "3b39fe2fbe598d59b160f091d9372563ffc7643f2f0031ae85669b3c83c7f651", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative4]' is used", - "actual_value": "'aws_security_group[negative4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "76b7c3aaf1da33fac752d44d1160f90bb008fec161489243005ee2beb7278e5a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "11fa9ac15d69d8123ce1fb038f3086a7621d7c7fcc4fc40470372a5bef90a172", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive3]' is used", - "actual_value": "'aws_security_group[positive3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "d9265eeefbc0892b393fd33b7d3188f7595eee896631bff626666ae606131752", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf", - "similarity_id": "79736e14b588a95ce6d2b547b4433187e32f6b99348adbe8b12f98af96dd9547", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf", - "similarity_id": "a9edad357d7df714428d702fd554dcb88855d77ed56f94add9b002e863b3c896", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive3]' is used", - "actual_value": "'aws_security_group[positive3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", - "similarity_id": "d4e7db0358e3d6347e46e46bbdd7e88f2a0820270b40061629d50a192091bded", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", - "similarity_id": "36440f30c6b51ef6561c700d8c4a8502d89631075c7477858c39dc84bb228f10", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - } - ] - }, - { - "query_name": "Security Group Rules Without Description", - "query_id": "68eb4bf3-f9bf-463d-b5cf-e029bb446d2e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "It's considered a best practice for all rules in AWS Security Group to have a description", - "description_id": "cee242dd", - "files": [ - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "2dc0890b59a106e2cc426d77c23e9c522a9a7d035f1e09574ef6e25d8bc0424d", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", - "similarity_id": "3daaac79ee6edcaf76dcc89b9d01d077cce8b198635e77101b7af5e926ed8641", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "4862ce071bb1d363b000bb53ee240dd6ce35c559be4b0e6d83e1fdc9b7e7314a", - "line": 58, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow-public-outbound-sg}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "100519cbdcf3df4d0211a20cb28c13adcd5d3a41b135d2503ebfcc726c54b90f", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "45afdd7085631fae75df9b1cc77c348dc1e8205c8d9ed4247dbf6451bd4dbad2", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "8b5418ea08b72998227db1ccdd96661374704e9dd758d77b927ebb078a84251c", - "line": 62, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{public-internet-sg}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{public-internet-sg}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{public-internet-sg}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "f363c10a06cbd3031d28c22bb804d8fe9ac6ea983fd34c5cecf6c09f9e3470ff", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "411575ac5d72e413a809b85a05e761ba96e7633770e49f89b40c9e1df4e45bd5", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", - "similarity_id": "8db84596a4f3c9ed090cb85b1ba47ec6bff3e2bd46a4fa67eb6e30f1128c002a", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", - "similarity_id": "e6462b6dc7888e2303da32d39a6ca6492a7f970dd6ffbfb0661983a49eb49f15", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "cd5b8301be50491b2efdb0fc76328180ba90a0dfcc92d4f0cfa27574d1bc9035", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", - "similarity_id": "78e5e7cadcb973bb9b1edd29dc451d181fbc58bce43d62058e4271a87ce9a688", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "e364258f261f1f792e394a9fa474cc907c412e6b7b152056fa142293c8e3d81d", - "line": 19, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "66303822c8f1bb7301836bc3106b13500cb007ebda808c4055f6c6de042eaf03", - "line": 63, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow-public-outbound-sg2}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", - "similarity_id": "630f14396cdf3166c5ac459ba9b4e3011129ee94ea36e24575884f1b8641aae5", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", - "similarity_id": "22cb57ab0377190165707a44fecf388ba1c081fc3bad1e7f064c3b5be49902e0", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "fccd7ce54c2f81017555931784cea70f2e01361f00e4ac8a03695c0040ad0964", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "22b988c42c73026fb8616bb9756b84ec39d8874a19554c42878fe3bb8c747ac5", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "3c150a59c35c8bd3e463e4f250c4ebbd6f99d2c9323f6a8bf33b682f92be0de2", - "line": 55, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{public-internet-sg}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{public-internet-sg}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{public-internet-sg}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "f0287963b35b539518c81d5e5705038c7a093b37ccd86e04984a5cc2ccfcf7c8", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "18976e48fb2ec3241f93fb5eabce67d71feb122559e9703096eec271454f8caf", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "646e5183aad86fcdb33b2dbc958c0021df017a383467ea1a8e727247723f3412", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "a823d1d90808d0393349ec071a2d231c19f39d83371b1dbe39c1061428f233ba", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "2bc8be5c1319dd1601fab22812dd209065f13deb48748dfd74c18d95f82d89f1", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - } - ] - }, - { - "query_name": "Security Group Without Description", - "query_id": "cb3f5ed6-0d18-40de-a93d-b3538db31e8c", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "It's considered a best practice for AWS Security Group to have a description", - "description_id": "bc535d27", - "files": [ - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "97295dc3bd259c7e904b577e51bd58c118a70713285e524a540cb130ef33029a", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative_rdp_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative_rdp_2}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative_rdp_2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", - "similarity_id": "cc27ed549e2644065d4800aa7d84131465c07608116018b6ef0b57e894e04434", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}] description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", - "similarity_id": "6b9ceea4e2161112b8bceecf47b8345cec460bd8c845ce32de6676d69371e044", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative3}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "f25c2a2ae6ea0b4f2cb887b2f33f69ce1569f7b00a0522c8c8d667a4ded0cca8", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "478294c875a639c111f30cc1a334adb94d041dd954eb079c60032546b49e6a82", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", - "similarity_id": "908a0c7610f98be7cbcb4b91fe44df06b11c2a83b199a56ba1399d8fbead49cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", - "similarity_id": "2c0c6e0149f1762c8cf78222421d2f2b8326c3426b28db7f88d03032570e5735", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}] description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", - "similarity_id": "220fd79273145fe5498f8f7f17e043b9442d52572d2c254f4a210fb1bc6bd824", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}] description is defined and not null", - "actual_value": "aws_security_group[{{positive3}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "ba762cc45131836f9b5f790de302e30c86fae6eaecc9519ca2ee8eb58041bc68", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative3}}] description is undefined or null" - } - ] - }, - { - "query_name": "Variable Without Description", - "query_id": "2a153952-2544-4687-bcc9-cc8fea814a9b", - "query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "All variables should contain a valid description.", - "description_id": "b44986be", - "files": [ - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", - "similarity_id": "62078456419f5622852ab8cf84462b2c74b43b06744b5a34c25e80b23ad3d702", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "41f26963a12df7c1151d97bf1b5d0709e431c561c906b7167901c764ae171689", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "variable.{{private_key_path}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "e381b53ef16b9c328c196929a5a26d4cdbd82d2977ea71dc4d596d2f74f98993", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "variable.{{region}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "0a7073b99329a57cb649f1c21da1367d170f02d41ac2e6e5f807d0109d2f6d6c", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "variable.{{aws_secret_key}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", - "similarity_id": "fa3f91cba9cd74a984e00c25bc2ac49ea65a279447c29c89176fdc4a3a035b78", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", - "similarity_id": "48d16e18162d19cf802b6e0c2aef11f2d50246dd9fdd7787b771ed385a8da0a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "c76818170cf4777255865bde01f29c4e33cd086469dbbd4d02b45e68afc24c09", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{aws_access_key}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "f6232ed43785f9d741f5a0671caef48ec4a173afe1c72e0ac5b581b8ed97343e", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "variable.{{key_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf", - "similarity_id": "1308d0e221e62b1e083f26fdfe97a407ee9dd096edc25877020b7cf9cdae2248", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", - "similarity_id": "df50786a61ae71ad217393ae9d4606050a29c48a30c9eaf8e958a0ca8021c4c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", - "similarity_id": "3ef461b9af906c94d782dfb45daf8edb1d5007e815eb6b42ab5a9190a5ec4b42", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", - "similarity_id": "022f0f34de59966151af271df69219e424a7f374245ee40c7c75aa2f6e8a4384", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - } - ] - }, - { - "query_name": "Variable Without Type", - "query_id": "fc5109bf-01fd-49fb-8bde-4492b543c34a", - "query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "All variables should contain a valid type.", - "description_id": "bba696eb", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "19c801966dd2da16397ad711be930605bd6b1a1be3b41f0993e8d883934ad502", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "variable.{{aws_secret_key}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "6684e95bc8f93fd55f4d3a5c4890655b3bb5591bc18227c940930beb7637d06e", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "variable.{{region}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "f08f903d32e8d577c959094b07d53f57730ad1af1a848156b65ac30025508d7f", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "variable.{{key_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "2a6e2d88043d99605c846cb8c13e1c90470d7b25e81fa49db30c7316cf3a47ed", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{aws_access_key}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "e340e3072f2ef20a185b495b9e412f688cd60f72a7b78867f42c2e525f335e23", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "variable.{{private_key_path}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - } - ] - } - ], - "bill_of_materials": [ - { - "query_name": "BOM - S3 Buckets", - "query_id": "2d16c3fb-35ba-4ec0-b4e4-06ee3cbd4045", - "query_url": "https://kics.io", - "severity": "TRACE", - "platform": "Terraform", - "category": "Bill Of Materials", - "description": "A list of S3 resources specified", - "description_id": "0bdf2341", - "files": [ - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", - "similarity_id": "3cfe47bb5e3c6349b98542d91ee5274ed5996f4a13a9e471b073f5ce1582d99d", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", - "similarity_id": "20b34fd0c662cb32feced3769c55bd76e0525536aee17c586a2ff36859817714", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "e84fdc991f347648effc622245b9ca4ef7a8db1d439f913cd3c2311ceadfa007", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "aaac2e1ac7eae46819429dfac5e755cf0ad4dac75d51e3b412df9cd3ecdd801f", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", - "similarity_id": "225b5a3547c7224092d4e7dccb8b044bb8349dd52359285a8b3743dc7d33957f", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"Bool\\\": {\\n \\\"aws:SecureTransport\\\": \\\"false\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "ace6a40b375fbd216848326213cb26a261effae0af44a71a13a951710ff4abd5", - "line": 5, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[public-bucket2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-32\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", - "similarity_id": "fa667690d97015898c61ace4b7f7384e1014c124b7a9f58898ec55244e0b2f6e", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read-write\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", - "similarity_id": "e3fabada99372aa90bdbaa4ec222083b804ddfd18ac6bce27ce80dc566ca84c8", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"IpAddress\\\": {\\n \\\"aws:SourceIp\\\": \\\"8.8.8.8/32\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", - "similarity_id": "b208adf02709122124fcaf5c0a9531965c66fa008cdc2d83ba09af2b4dcec1d5", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", - "similarity_id": "5613eecc821464ca8934d3c2c8fe0c84ef382bbbdc83ef78d96e853511b641dc", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", - "similarity_id": "06d00bcf29f3f63e83fee5d9971e5d244306c97fbdbcf82b9cd43c13223e08a4", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my-tf-test-bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", - "similarity_id": "bb28259b6d8d780647c6fe0d93b3682ab79c869e1ec23275c0564bf222e80f4d", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[hoge]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"hoge\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", - "similarity_id": "a0269cda7a646c8aaba0dbb4b7f88e5347027d8a4c4deb514d83fa9b85e71774", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "e5a588d03ed11119b0afcb00362423fb68d1623a82723ee51747d426bbca6988", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", - "similarity_id": "f466e21861d0d5f6bce99223e7d54d0e7a2ff556c78ce30b38abf5e598fc4419", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", - "similarity_id": "5d021c75ef09a3e9e8103c6c6f98a9ac83ebf924e843ac79342e221540cce2fa", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", - "similarity_id": "91d6fe9be8dca86488c76245854106ce1f9124849e3ae8dc59b391bfadc3a582", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:*\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", - "similarity_id": "705d28ba4cf90b667145415031ab834a69916db85ede5128933e11d6f7c599cf", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", - "similarity_id": "ecbd8d8be3c3aa0925bb400f55a414ee85e50d8206125a585fb859b6b7399403", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", - "similarity_id": "36a6df64dff9bdbe2b749f8ab445bc51774b63e36e47af8fc66fdf7e00c2f5d1", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", - "similarity_id": "fd23b519d9de3c9e937d36c6c15ed6b2d30857d14504942ff8594acd02238a74", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\"}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "8aa92d328b0c2510f739b1ea6307d0f1e4cf7ac9260d8b5c2311b74fb824153f", - "line": 69, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", - "similarity_id": "184e8a008eeceb0d552201392fec564a5f78683cc4baae6ad1b2c3a3b9b63cd9", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", - "similarity_id": "f4441d44c8dce3d033bc61abad849e84e0a20fff1a0200445cadc9a70d6ee1a2", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", - "similarity_id": "671b661eec245970e807af4391c3ebbb8541d19388b8fb499ce71ff70c3df226", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", - "similarity_id": "930988ac27e4f1682a2299c1e8675787b24e3572ce516a4e41ae65f647a8ea14", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", - "similarity_id": "96b65d7ec60d5487931d8a786e663b5ebdfdf1b909a60dd9be4984892fae3a79", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[hoge]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"hoge\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", - "similarity_id": "1a0ab5ee1405fb6fbf510f27412091d4abc0e7ef3f045c03e883a80ba69abe0a", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"cors_rule\":{\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000}}" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "1bfbe33817f5456a6025a9d3b83fff5ad8001dece3b05b58f59d0d9f3209f064", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", - "similarity_id": "d724252e60d639385ecaa09935add198de4965fd23e3ba8dc842bcde1bcf3af7", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "9ef1ca02e068fd6e648c12ff0ef580b3ffcfc6dd8029f4f3f90be64da3a8e855", - "line": 16, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[foo2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"${aws_s3_bucket.log_bucket.id}\",\"target_prefix\":\"log/\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", - "similarity_id": "439cdfaeaedcf60ccb07cfc151f55de34864a6fd9017faac60039058b67210b5", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[examplebucket]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", - "similarity_id": "c3ad79e29a0d7155321fc3d0f9047b7f34ad844eb26b14e62f07e75230d1ebd2", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"some-key\",\"sse_algorithm\":\"AES256\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", - "similarity_id": "d9ded88fa570d9a95bb6addc41877ba64def60b05b7ed2782f03b96b5531b695", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", - "similarity_id": "dccd9ebfcd719742700a961317fde677cebcc3a50c0b2f7bfbe5dbe24f05ed7f", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "1f6f4c688f980a8b94aa9ee3fcc1611c87d25a564fe9fbec7396f2fe9378d027", - "line": 5, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[public-bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-3\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", - "similarity_id": "f4cb214e402e7f6a4f7ddfef2574ab338a3e9325928d82eb65b922101520fea3", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", - "similarity_id": "8ca0b7b2a315fa9c1b6b28f38213fd72ec27c8c29e14ae2390f7be30bce0888c", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "feb3a1e708d932c7e9e508e91410f12018c53eba1a3d0a73bc7ff64f98a16603", - "line": 19, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "6da57ecf0ef32da4afbbe03be3c29560a7ab8d3201aaad13258ee1dcf3dc6fab", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", - "similarity_id": "70a2a1a20a3ef61e2c52d44a9f51f6852f0f97636e5b977342dac5af1af9c5c1", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "7d38380efc922c9e2a2138848f3227358107e15b153acc4ae67f45b926ed1082", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", - "similarity_id": "03ef4eeb44cc99c658039cd3a974e8ca5ef27302e7e9ab8f58f4a73ce8998a0d", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"GET\",\"PUT\",\"POST\",\"DELETE\",\"HEAD\"],\"allowed_origins\":[\"*\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", - "similarity_id": "81ae4518a54b75efd3cb1199be55b7afa3201173f3ab119a53b8976e3af7c79a", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"website\":{\"error_document\":\"error.html\",\"index_document\":\"index.html\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "67a97d3821c1fb10e749d6538a7eeb690825a3d79350caeddbe531e56416c0b9", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[log_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"log-delivery-write\",\"bucket\":\"my-tf-log-bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", - "similarity_id": "6604099d7d3c93c84624b67926d65094d828398b9d5e4327cfb842a50a411e49", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my-tf-test-bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "e511aa399e157dd721d42b9d3249def9a50cd140337857f25fbe0df00d64522b", - "line": 20, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[foo3]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current3.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", - "similarity_id": "198cbc0ccc999475689626fcb64a6544d288966f5bcdfc7983ed4d41a1081138", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"authenticated-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "95bfc44a4337badf496c97f0bf8648e21203e4020878a018648ee2ee71ff9424", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", - "similarity_id": "ad415d657ef54484a27a9f197fed0dfe922f5d57dfa3347107c896ba28354b0b", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[examplebucket]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", - "similarity_id": "4284ee3c815ea34a164c9d1d1bd41c23f86401c80c0dd3671a0dc5aece1ce4eb", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", - "similarity_id": "ea34f358f6e9d96683cfd53c5785ca7c6b5c3cf85c75d3574788bafe0bed6abb", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", - "similarity_id": "b49586a525c02b6b1e996a8dba4269c7eeadfb794ac7df7dd8e0bd10ae7456b8", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "52a4ead57d40049da3b0f60cf9f8c992a47f0cadd75bf761005121133a01979a", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", - "similarity_id": "c7953fb7aa44cc79fd055c52cc70ae98ed42c2a4f4bab036a614061ad00bbfc6", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", - "similarity_id": "dee2e88009ac8e34ef3d5f02bb802ecc43558d74ffdd71f83f41ab656a906301", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", - "similarity_id": "f5aef5e494ab7efdbecb94e4c7e2dbe6ad95f06addd2ffffcc01a47e2e24c1c2", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", - "similarity_id": "ae3ded1985cb283bf170c1553793a5815577ad55acd8be6768c9f1e406f3ac7d", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", - "similarity_id": "caff2c6eef0e43d2e2a2f609284d4a965372bfd162398996b3dfe3f1677229dc", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:putObject\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", - "similarity_id": "9430b62718b0a7f9273c57285497bf4c6230b960dbcee3ee1735d54d5ff25140", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"${aws_kms_key.mykey.arn}\",\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", - "similarity_id": "7c0a7ad742cf3016ba7ac1deace3421835f5a1d6230cbc5d4aae22702026985f", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"logs\"},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "76144ef296c0cc5b8505090d561fff1e126e10d71f2c7a6b21932eddd70f5bb5", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - } - ] - } - ] -} \ No newline at end of file diff --git a/src/commenter.js b/src/commenter.js index bb1a433..df7f6bb 100644 --- a/src/commenter.js +++ b/src/commenter.js @@ -1,4 +1,3 @@ -const fs = require("fs"); const moment = require('moment') const kicsLogo = "https://user-images.githubusercontent.com/75368139/136991766-a4e5bc8b-63db-48f7-9384-740e9f15c9f6.png" @@ -11,13 +10,6 @@ const severityIcons = { "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" } - -function readJSON(filename) { - const rawdata = fs.readFileSync(filename); - const parsedJSON = JSON.parse(rawdata.toString()); - return parsedJSON; -} - function createComment(results) { let message = "![kics-logo](" + kicsLogo + ")\n"; @@ -49,12 +41,8 @@ function createComment(results) { return message; } -async function postPRComment(repo, prNumber) { - const githubToken = core.getInput("token"); - const octokit = github.getOctokit(githubToken); - const results = readJSON("results.json"); +async function postPRComment(results, repo, prNumber, octokit) { const message = createComment(results); - console.log(message); const { data: comments } = await octokit.rest.issues.listComments({ ...repo, @@ -85,4 +73,4 @@ async function postPRComment(repo, prNumber) { module.exports = { postPRComment -}; \ No newline at end of file +}; diff --git a/src/install.js b/src/install.js index ff5b22a..dd49561 100644 --- a/src/install.js +++ b/src/install.js @@ -90,4 +90,4 @@ async function installKICS(kicsVersion) { module.exports = { installKICS -} \ No newline at end of file +} diff --git a/src/main.js b/src/main.js index d85b696..7a53166 100644 --- a/src/main.js +++ b/src/main.js @@ -1,31 +1,100 @@ const install = require("./install"); const commenter = require("./commenter"); const scanner = require("./scanner"); + const core = require("@actions/core"); const github = require("@actions/github"); +const fs = require("fs"); + const actionInputs = { kics_version: { value: core.getInput('kics_version') }, enable_comments: { value: core.getInput('enable_comments') }, } +const exitStatus = { + results: { + codes: { + HIGH: 50, + MEDIUM: 40, + LOW: 30, + INFO: 20, + }, + isResultExitStatus: function (exitCode) { + for (const key in this.codes) { + if (this.codes[key] === exitCode) { + return true; + } + } + return false; + } + } +} + +function setWorkflowStatus(statusCode) { + console.log(`KICS scan status code: ${statusCode}`); + + const ignoreOnExit = core.getInput('ignore_on_exit'); + + if (ignoreOnExit.toLowerCase() === 'all') { + console.log(`ignore_on_exit=all :: Ignoring exit code ${statusCode}`); + return; + } + + if (ignoreOnExit.toLowerCase() === 'results') { + if (exitStatus.results.isResultExitStatus(statusCode)) { + console.log(`ignore_on_exit=results :: Ignoring exit code ${statusCode}`); + return; + } + } + if (ignoreOnExit.toLowerCase() === 'errors') { + if (!exitStatus.results.isResultExitStatus(statusCode)) { + console.log(`ignore_on_exit=errors :: Ignoring exit code ${statusCode}`); + return; + } + } + + core.setFailed(`KICS scan failed with exit code ${statusCode}`); +} + +function readJSON(filename) { + const rawdata = fs.readFileSync(filename); + const parsedJSON = JSON.parse(rawdata.toString()); + return parsedJSON; +} + async function main() { console.log("Running KICS action..."); try { + const githubToken = core.getInput("token"); + const octokit = github.getOctokit(githubToken); let enableComments = actionInputs.enable_comments.value.toLocaleLowerCase() === "true"; - const context = github.context; - const repository = context.repo; - console.log(context); - const pullRequestNumber = context.payload.pull_request.number; - await install.installKICS(); - await scanner.scanWithKICS(enableComments); - if (enableComments) { - await commenter.commentOnPullRequest(repository, pullRequestNumber); + let context = {}; + let repo = ''; + let prNumber = ''; + + if (github.context) { + context = github.context; + if (context.repo) { + repo = context.repo; + } + if (context.payload && context.payload.pull_request) { + prNumber = context.payload.pull_request.number; + } } + + await install.installKICS(); + const scanResults = await scanner.scanWithKICS(enableComments); + if (enableComments) { + let parsedResults = readJSON(scanResults.resultsFile); + await commenter.postPRComment(parsedResults, repo, prNumber, octokit); + } + + setWorkflowStatus(scanResults.statusCode); } catch (e) { console.error(e); core.setFailed(e.message); } } -main(); \ No newline at end of file +main(); diff --git a/src/scanner.js b/src/scanner.js index 9cb2842..766ea69 100644 --- a/src/scanner.js +++ b/src/scanner.js @@ -1,11 +1,11 @@ const exec = require('@actions/exec'); - const core = require("@actions/core"); +const filepath = require('path'); const kicsBinary = 'kics'; const kicsInput = { - path: { value_type: "string", flag: '--path', value: core.getInput('path') }, + path: { value_type: "list", flag: '--path', value: core.getInput('path') }, ignore_on_exit: { value_type: "list", flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, fail_on: { value_type: "list", flag: '--fail-on', value: core.getInput('fail_on') }, timeout: { value_type: "int", flag: '--timeout', value: core.getInput('timeout') }, @@ -29,9 +29,11 @@ const kicsInput = { }; async function scanWithKICS(enableComments) { + let resultsFile; + if (!kicsInput.path.value) { core.error('Path to scan is not set'); - throw new Error('Path to scan is not set'); + core.setFailed('Path to scan is not set'); } let cmdArgs = []; for (let input in kicsInput) { @@ -42,25 +44,51 @@ async function scanWithKICS(enableComments) { } } else if (kicsInput[input].value_type === 'list') { if (kicsInput[input].value) { - cmdArgs.push(kicsInput[input].flag); - cmdArgs.push(kicsInput[input].value); + if (kicsInput[input].value.indexOf(',') > -1) { + kicsInput[input].value.split(',').forEach(value => { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(value); + }); + } else { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } } } else if (kicsInput[input].value_type === 'bool') { if (kicsInput[input].value) { cmdArgs.push(kicsInput[input].flag); } + } else if (kicsInput[input].value_type === 'int') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } } } + + // making sure results.json is always created when PR comments are enabled if (enableComments) { if (!cmdArgs.find(arg => arg == '--output-path')) { cmdArgs.push('--output-path'); cmdArgs.push('./'); + resultsFile = './results.json'; + } else { + const outputFormats = core.getInput('output_formats'); + if (!outputFormats.toLowerCase().indexOf('json')) { + cmdArgs.push('--output-formats'); + cmdArgs.push('json'); + } + let resultsDir = core.getInput('output_path'); + resultsFile = filepath.join(resultsDir, '/results.json'); } } - - return await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`) + exitCode = await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`, [], { ignoreReturnCode: true }); + return { + statusCode: exitCode, + resultsFile: resultsFile + }; } module.exports = { scanWithKICS -}; \ No newline at end of file +}; diff --git a/positive.tf b/test/samples/positive1.tf similarity index 100% rename from positive.tf rename to test/samples/positive1.tf diff --git a/test/samples/positive2.tf b/test/samples/positive2.tf new file mode 100644 index 0000000..c6f4d82 --- /dev/null +++ b/test/samples/positive2.tf @@ -0,0 +1,13 @@ +resource "azurerm_resource_group" "positive1" { + name = "resourceGroup1" + location = "West US" +} + +resource "azurerm_container_registry" "positive2" { + name = "containerRegistry1" + resource_group_name = azurerm_resource_group.rg.name + location = azurerm_resource_group.rg.location + sku = "Premium" + admin_enabled = true + georeplication_locations = ["East US", "West Europe"] +}