diff --git a/.github/workflows/test-action.yaml b/.github/workflows/test-action.yaml new file mode 100644 index 0000000..c4fb64d --- /dev/null +++ b/.github/workflows/test-action.yaml @@ -0,0 +1,14 @@ +name: Test + +on: + pull_request: + types: [opened] + +jobs: + test: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v2 + - uses: ./ + with: + path: positive.tf diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..55371e5 --- /dev/null +++ b/.gitignore @@ -0,0 +1,2 @@ +node_modules +.vscode \ No newline at end of file diff --git a/Dockerfile b/Dockerfile deleted file mode 100644 index 5795d6a..0000000 --- a/Dockerfile +++ /dev/null @@ -1,7 +0,0 @@ -FROM checkmarx/kics:v1.4.4-alpine - -COPY entrypoint.sh /entrypoint.sh - -RUN chmod +x /entrypoint.sh - -ENTRYPOINT ["/entrypoint.sh"] diff --git a/action.yml b/action.yml index bbabc77..e952ee6 100644 --- a/action.yml +++ b/action.yml @@ -1,27 +1,35 @@ # action.yml -name: 'KICS Github Action' -description: 'Run KICS scan against IaC projects' +name: "KICS Github Action" +description: "Run KICS scan against IaC projects" inputs: + kics_version: + required: false + default: "latest" + description: "KICS version to use (defaults to latest)" + enable_pr_comments: + required: false + default: false + description: "Enable PR comments" path: - description: 'paths to a file or directories to scan, accepts a comma separated list' + description: "paths to a file or directories to scan, accepts a comma separated list" required: true ignore_on_exit: - description: 'defines which non-zero exit codes should be ignored (all, results, errors, none)' + description: "defines which non-zero exit codes should be ignored (all, results, errors, none)" required: false fail_on: - description: 'comma separated list of which severities returns exit code !=0' + description: "comma separated list of which severities returns exit code !=0" required: false timeout: - description: 'number of seconds the query has to execute before being canceled' + description: "number of seconds the query has to execute before being canceled" required: false profiling: - description: 'turns on profiler that prints resource consumption in the logs during the execution (CPU, MEM)' + description: "turns on profiler that prints resource consumption in the logs during the execution (CPU, MEM)" required: false config_path: - description: 'path to configuration file' + description: "path to configuration file" required: false platform_type: - description: 'case insensitive list of platform types to scan' + description: "case insensitive list of platform types to scan" required: false exclude_paths: description: "exclude paths from scan, supports glob, quoted comma separated string example: './shouldNotScan/*,somefile.txt'" @@ -39,39 +47,44 @@ inputs: description: "formats in which the results report will be exported (json, sarif)" required: false output_path: - description: 'file path to store results report (json, sarif)' + description: "file path to store results report (json, sarif)" required: false payload_path: - description: 'file path to store source internal representation in JSON format' + description: "file path to store source internal representation in JSON format" required: false queries: description: 'path to directory with queries (default "./assets/queries")' required: false + secrets_regexes_path: + description: "path to secrets regex rules configuration file" + required: false + libraries_path: + description: "path to directory with libraries" + required: false + disable_full_descriptions: + description: "disable request for full descriptions and use default vulnerability descriptions" + required: false + disable_secrets: + description: "disable secrets detection" + required: false + type: + description: "case insensitive comma-separated list of platform types to scan (Ansible, AzureResourceManager, CloudFormation, Dockerfile, Kubernetes, OpenAPI, Terraform)" + required: false verbose: - description: 'verbose scan' + description: "verbose scan" + required: false + include_queries: + description: "comma separated list of queries ID's to include, cannot be provided with query exclusion flags" + required: false + bom: + description: "include bill of materials (BoM) in results output" + required: false outputs: results: - description: 'the result of KICS scan' + description: "the result of KICS scan" branding: - icon: 'shield' - color: 'green' + icon: "shield" + color: "green" runs: - using: 'docker' - image: 'Dockerfile' - args: - - ${{ inputs.path }} - - ${{ inputs.ignore_on_exit }} - - ${{ inputs.fail_on }} - - ${{ inputs.timeout }} - - ${{ inputs.profiling }} - - ${{ inputs.config }} - - ${{ inputs.platform_type }} - - ${{ inputs.exclude_paths }} - - ${{ inputs.exclude_queries }} - - ${{ inputs.exclude_categories }} - - ${{ inputs.exclude_results }} - - ${{ inputs.output_formats }} - - ${{ inputs.output_path }} - - ${{ inputs.payload_path }} - - ${{ inputs.queries }} - - ${{ inputs.verbose }} \ No newline at end of file + using: node12 + main: dist/index.js diff --git a/deps.txt b/deps.txt new file mode 100644 index 0000000..008478c --- /dev/null +++ b/deps.txt @@ -0,0 +1,3 @@ + "@fohlen/github-release-downloader": "^1.0.0", + "decompress": "^4.2.1", + "decompress-targz": "^4.1.1", \ No newline at end of file diff --git a/dist/index.js b/dist/index.js new file mode 100644 index 0000000..437bb63 --- /dev/null +++ b/dist/index.js @@ -0,0 +1,11564 @@ +/******/ (() => { // webpackBootstrap +/******/ var __webpack_modules__ = ({ + +/***/ 351: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.issue = exports.issueCommand = void 0; +const os = __importStar(__nccwpck_require__(87)); +const utils_1 = __nccwpck_require__(278); +/** + * Commands + * + * Command Format: + * ::name key=value,key=value::message + * + * Examples: + * ::warning::This is the message + * ::set-env name=MY_VAR::some value + */ +function issueCommand(command, properties, message) { + const cmd = new Command(command, properties, message); + process.stdout.write(cmd.toString() + os.EOL); +} +exports.issueCommand = issueCommand; +function issue(name, message = '') { + issueCommand(name, {}, message); +} +exports.issue = issue; +const CMD_STRING = '::'; +class Command { + constructor(command, properties, message) { + if (!command) { + command = 'missing.command'; + } + this.command = command; + this.properties = properties; + this.message = message; + } + toString() { + let cmdStr = CMD_STRING + this.command; + if (this.properties && Object.keys(this.properties).length > 0) { + cmdStr += ' '; + let first = true; + for (const key in this.properties) { + if (this.properties.hasOwnProperty(key)) { + const val = this.properties[key]; + if (val) { + if (first) { + first = false; + } + else { + cmdStr += ','; + } + cmdStr += `${key}=${escapeProperty(val)}`; + } + } + } + } + cmdStr += `${CMD_STRING}${escapeData(this.message)}`; + return cmdStr; + } +} +function escapeData(s) { + return utils_1.toCommandValue(s) + .replace(/%/g, '%25') + .replace(/\r/g, '%0D') + .replace(/\n/g, '%0A'); +} +function escapeProperty(s) { + return utils_1.toCommandValue(s) + .replace(/%/g, '%25') + .replace(/\r/g, '%0D') + .replace(/\n/g, '%0A') + .replace(/:/g, '%3A') + .replace(/,/g, '%2C'); +} +//# sourceMappingURL=command.js.map + +/***/ }), + +/***/ 186: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.getIDToken = exports.getState = exports.saveState = exports.group = exports.endGroup = exports.startGroup = exports.info = exports.notice = exports.warning = exports.error = exports.debug = exports.isDebug = exports.setFailed = exports.setCommandEcho = exports.setOutput = exports.getBooleanInput = exports.getMultilineInput = exports.getInput = exports.addPath = exports.setSecret = exports.exportVariable = exports.ExitCode = void 0; +const command_1 = __nccwpck_require__(351); +const file_command_1 = __nccwpck_require__(717); +const utils_1 = __nccwpck_require__(278); +const os = __importStar(__nccwpck_require__(87)); +const path = __importStar(__nccwpck_require__(622)); +const oidc_utils_1 = __nccwpck_require__(41); +/** + * The code to exit an action + */ +var ExitCode; +(function (ExitCode) { + /** + * A code indicating that the action was successful + */ + ExitCode[ExitCode["Success"] = 0] = "Success"; + /** + * A code indicating that the action was a failure + */ + ExitCode[ExitCode["Failure"] = 1] = "Failure"; +})(ExitCode = exports.ExitCode || (exports.ExitCode = {})); +//----------------------------------------------------------------------- +// Variables +//----------------------------------------------------------------------- +/** + * Sets env variable for this action and future actions in the job + * @param name the name of the variable to set + * @param val the value of the variable. Non-string values will be converted to a string via JSON.stringify + */ +// eslint-disable-next-line @typescript-eslint/no-explicit-any +function exportVariable(name, val) { + const convertedVal = utils_1.toCommandValue(val); + process.env[name] = convertedVal; + const filePath = process.env['GITHUB_ENV'] || ''; + if (filePath) { + const delimiter = '_GitHubActionsFileCommandDelimeter_'; + const commandValue = `${name}<<${delimiter}${os.EOL}${convertedVal}${os.EOL}${delimiter}`; + file_command_1.issueCommand('ENV', commandValue); + } + else { + command_1.issueCommand('set-env', { name }, convertedVal); + } +} +exports.exportVariable = exportVariable; +/** + * Registers a secret which will get masked from logs + * @param secret value of the secret + */ +function setSecret(secret) { + command_1.issueCommand('add-mask', {}, secret); +} +exports.setSecret = setSecret; +/** + * Prepends inputPath to the PATH (for this action and future actions) + * @param inputPath + */ +function addPath(inputPath) { + const filePath = process.env['GITHUB_PATH'] || ''; + if (filePath) { + file_command_1.issueCommand('PATH', inputPath); + } + else { + command_1.issueCommand('add-path', {}, inputPath); + } + process.env['PATH'] = `${inputPath}${path.delimiter}${process.env['PATH']}`; +} +exports.addPath = addPath; +/** + * Gets the value of an input. + * Unless trimWhitespace is set to false in InputOptions, the value is also trimmed. + * Returns an empty string if the value is not defined. + * + * @param name name of the input to get + * @param options optional. See InputOptions. + * @returns string + */ +function getInput(name, options) { + const val = process.env[`INPUT_${name.replace(/ /g, '_').toUpperCase()}`] || ''; + if (options && options.required && !val) { + throw new Error(`Input required and not supplied: ${name}`); + } + if (options && options.trimWhitespace === false) { + return val; + } + return val.trim(); +} +exports.getInput = getInput; +/** + * Gets the values of an multiline input. Each value is also trimmed. + * + * @param name name of the input to get + * @param options optional. See InputOptions. + * @returns string[] + * + */ +function getMultilineInput(name, options) { + const inputs = getInput(name, options) + .split('\n') + .filter(x => x !== ''); + return inputs; +} +exports.getMultilineInput = getMultilineInput; +/** + * Gets the input value of the boolean type in the YAML 1.2 "core schema" specification. + * Support boolean input list: `true | True | TRUE | false | False | FALSE` . + * The return value is also in boolean type. + * ref: https://yaml.org/spec/1.2/spec.html#id2804923 + * + * @param name name of the input to get + * @param options optional. See InputOptions. + * @returns boolean + */ +function getBooleanInput(name, options) { + const trueValue = ['true', 'True', 'TRUE']; + const falseValue = ['false', 'False', 'FALSE']; + const val = getInput(name, options); + if (trueValue.includes(val)) + return true; + if (falseValue.includes(val)) + return false; + throw new TypeError(`Input does not meet YAML 1.2 "Core Schema" specification: ${name}\n` + + `Support boolean input list: \`true | True | TRUE | false | False | FALSE\``); +} +exports.getBooleanInput = getBooleanInput; +/** + * Sets the value of an output. + * + * @param name name of the output to set + * @param value value to store. Non-string values will be converted to a string via JSON.stringify + */ +// eslint-disable-next-line @typescript-eslint/no-explicit-any +function setOutput(name, value) { + process.stdout.write(os.EOL); + command_1.issueCommand('set-output', { name }, value); +} +exports.setOutput = setOutput; +/** + * Enables or disables the echoing of commands into stdout for the rest of the step. + * Echoing is disabled by default if ACTIONS_STEP_DEBUG is not set. + * + */ +function setCommandEcho(enabled) { + command_1.issue('echo', enabled ? 'on' : 'off'); +} +exports.setCommandEcho = setCommandEcho; +//----------------------------------------------------------------------- +// Results +//----------------------------------------------------------------------- +/** + * Sets the action status to failed. + * When the action exits it will be with an exit code of 1 + * @param message add error issue message + */ +function setFailed(message) { + process.exitCode = ExitCode.Failure; + error(message); +} +exports.setFailed = setFailed; +//----------------------------------------------------------------------- +// Logging Commands +//----------------------------------------------------------------------- +/** + * Gets whether Actions Step Debug is on or not + */ +function isDebug() { + return process.env['RUNNER_DEBUG'] === '1'; +} +exports.isDebug = isDebug; +/** + * Writes debug message to user log + * @param message debug message + */ +function debug(message) { + command_1.issueCommand('debug', {}, message); +} +exports.debug = debug; +/** + * Adds an error issue + * @param message error issue message. Errors will be converted to string via toString() + * @param properties optional properties to add to the annotation. + */ +function error(message, properties = {}) { + command_1.issueCommand('error', utils_1.toCommandProperties(properties), message instanceof Error ? message.toString() : message); +} +exports.error = error; +/** + * Adds a warning issue + * @param message warning issue message. Errors will be converted to string via toString() + * @param properties optional properties to add to the annotation. + */ +function warning(message, properties = {}) { + command_1.issueCommand('warning', utils_1.toCommandProperties(properties), message instanceof Error ? message.toString() : message); +} +exports.warning = warning; +/** + * Adds a notice issue + * @param message notice issue message. Errors will be converted to string via toString() + * @param properties optional properties to add to the annotation. + */ +function notice(message, properties = {}) { + command_1.issueCommand('notice', utils_1.toCommandProperties(properties), message instanceof Error ? message.toString() : message); +} +exports.notice = notice; +/** + * Writes info to log with console.log. + * @param message info message + */ +function info(message) { + process.stdout.write(message + os.EOL); +} +exports.info = info; +/** + * Begin an output group. + * + * Output until the next `groupEnd` will be foldable in this group + * + * @param name The name of the output group + */ +function startGroup(name) { + command_1.issue('group', name); +} +exports.startGroup = startGroup; +/** + * End an output group. + */ +function endGroup() { + command_1.issue('endgroup'); +} +exports.endGroup = endGroup; +/** + * Wrap an asynchronous function call in a group. + * + * Returns the same type as the function itself. + * + * @param name The name of the group + * @param fn The function to wrap in the group + */ +function group(name, fn) { + return __awaiter(this, void 0, void 0, function* () { + startGroup(name); + let result; + try { + result = yield fn(); + } + finally { + endGroup(); + } + return result; + }); +} +exports.group = group; +//----------------------------------------------------------------------- +// Wrapper action state +//----------------------------------------------------------------------- +/** + * Saves state for current action, the state can only be retrieved by this action's post job execution. + * + * @param name name of the state to store + * @param value value to store. Non-string values will be converted to a string via JSON.stringify + */ +// eslint-disable-next-line @typescript-eslint/no-explicit-any +function saveState(name, value) { + command_1.issueCommand('save-state', { name }, value); +} +exports.saveState = saveState; +/** + * Gets the value of an state set by this action's main execution. + * + * @param name name of the state to get + * @returns string + */ +function getState(name) { + return process.env[`STATE_${name}`] || ''; +} +exports.getState = getState; +function getIDToken(aud) { + return __awaiter(this, void 0, void 0, function* () { + return yield oidc_utils_1.OidcClient.getIDToken(aud); + }); +} +exports.getIDToken = getIDToken; +//# sourceMappingURL=core.js.map + +/***/ }), + +/***/ 717: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +// For internal use, subject to change. +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.issueCommand = void 0; +// We use any as a valid input type +/* eslint-disable @typescript-eslint/no-explicit-any */ +const fs = __importStar(__nccwpck_require__(747)); +const os = __importStar(__nccwpck_require__(87)); +const utils_1 = __nccwpck_require__(278); +function issueCommand(command, message) { + const filePath = process.env[`GITHUB_${command}`]; + if (!filePath) { + throw new Error(`Unable to find environment variable for file command ${command}`); + } + if (!fs.existsSync(filePath)) { + throw new Error(`Missing file at path: ${filePath}`); + } + fs.appendFileSync(filePath, `${utils_1.toCommandValue(message)}${os.EOL}`, { + encoding: 'utf8' + }); +} +exports.issueCommand = issueCommand; +//# sourceMappingURL=file-command.js.map + +/***/ }), + +/***/ 41: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.OidcClient = void 0; +const http_client_1 = __nccwpck_require__(925); +const auth_1 = __nccwpck_require__(702); +const core_1 = __nccwpck_require__(186); +class OidcClient { + static createHttpClient(allowRetry = true, maxRetry = 10) { + const requestOptions = { + allowRetries: allowRetry, + maxRetries: maxRetry + }; + return new http_client_1.HttpClient('actions/oidc-client', [new auth_1.BearerCredentialHandler(OidcClient.getRequestToken())], requestOptions); + } + static getRequestToken() { + const token = process.env['ACTIONS_ID_TOKEN_REQUEST_TOKEN']; + if (!token) { + throw new Error('Unable to get ACTIONS_ID_TOKEN_REQUEST_TOKEN env variable'); + } + return token; + } + static getIDTokenUrl() { + const runtimeUrl = process.env['ACTIONS_ID_TOKEN_REQUEST_URL']; + if (!runtimeUrl) { + throw new Error('Unable to get ACTIONS_ID_TOKEN_REQUEST_URL env variable'); + } + return runtimeUrl; + } + static getCall(id_token_url) { + var _a; + return __awaiter(this, void 0, void 0, function* () { + const httpclient = OidcClient.createHttpClient(); + const res = yield httpclient + .getJson(id_token_url) + .catch(error => { + throw new Error(`Failed to get ID Token. \n + Error Code : ${error.statusCode}\n + Error Message: ${error.result.message}`); + }); + const id_token = (_a = res.result) === null || _a === void 0 ? void 0 : _a.value; + if (!id_token) { + throw new Error('Response json body do not have ID Token field'); + } + return id_token; + }); + } + static getIDToken(audience) { + return __awaiter(this, void 0, void 0, function* () { + try { + // New ID Token is requested from action service + let id_token_url = OidcClient.getIDTokenUrl(); + if (audience) { + const encodedAudience = encodeURIComponent(audience); + id_token_url = `${id_token_url}&audience=${encodedAudience}`; + } + core_1.debug(`ID token url is ${id_token_url}`); + const id_token = yield OidcClient.getCall(id_token_url); + core_1.setSecret(id_token); + return id_token; + } + catch (error) { + throw new Error(`Error message: ${error.message}`); + } + }); + } +} +exports.OidcClient = OidcClient; +//# sourceMappingURL=oidc-utils.js.map + +/***/ }), + +/***/ 278: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + +// We use any as a valid input type +/* eslint-disable @typescript-eslint/no-explicit-any */ +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.toCommandProperties = exports.toCommandValue = void 0; +/** + * Sanitizes an input into a string so it can be passed into issueCommand safely + * @param input input to sanitize into a string + */ +function toCommandValue(input) { + if (input === null || input === undefined) { + return ''; + } + else if (typeof input === 'string' || input instanceof String) { + return input; + } + return JSON.stringify(input); +} +exports.toCommandValue = toCommandValue; +/** + * + * @param annotationProperties + * @returns The command properties to send with the actual annotation command + * See IssueCommandProperties: https://github.com/actions/runner/blob/main/src/Runner.Worker/ActionCommandManager.cs#L646 + */ +function toCommandProperties(annotationProperties) { + if (!Object.keys(annotationProperties).length) { + return {}; + } + return { + title: annotationProperties.title, + file: annotationProperties.file, + line: annotationProperties.startLine, + endLine: annotationProperties.endLine, + col: annotationProperties.startColumn, + endColumn: annotationProperties.endColumn + }; +} +exports.toCommandProperties = toCommandProperties; +//# sourceMappingURL=utils.js.map + +/***/ }), + +/***/ 514: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.getExecOutput = exports.exec = void 0; +const string_decoder_1 = __nccwpck_require__(304); +const tr = __importStar(__nccwpck_require__(159)); +/** + * Exec a command. + * Output will be streamed to the live console. + * Returns promise with return code + * + * @param commandLine command to execute (can include additional args). Must be correctly escaped. + * @param args optional arguments for tool. Escaping is handled by the lib. + * @param options optional exec options. See ExecOptions + * @returns Promise exit code + */ +function exec(commandLine, args, options) { + return __awaiter(this, void 0, void 0, function* () { + const commandArgs = tr.argStringToArray(commandLine); + if (commandArgs.length === 0) { + throw new Error(`Parameter 'commandLine' cannot be null or empty.`); + } + // Path to tool to execute should be first arg + const toolPath = commandArgs[0]; + args = commandArgs.slice(1).concat(args || []); + const runner = new tr.ToolRunner(toolPath, args, options); + return runner.exec(); + }); +} +exports.exec = exec; +/** + * Exec a command and get the output. + * Output will be streamed to the live console. + * Returns promise with the exit code and collected stdout and stderr + * + * @param commandLine command to execute (can include additional args). Must be correctly escaped. + * @param args optional arguments for tool. Escaping is handled by the lib. + * @param options optional exec options. See ExecOptions + * @returns Promise exit code, stdout, and stderr + */ +function getExecOutput(commandLine, args, options) { + var _a, _b; + return __awaiter(this, void 0, void 0, function* () { + let stdout = ''; + let stderr = ''; + //Using string decoder covers the case where a mult-byte character is split + const stdoutDecoder = new string_decoder_1.StringDecoder('utf8'); + const stderrDecoder = new string_decoder_1.StringDecoder('utf8'); + const originalStdoutListener = (_a = options === null || options === void 0 ? void 0 : options.listeners) === null || _a === void 0 ? void 0 : _a.stdout; + const originalStdErrListener = (_b = options === null || options === void 0 ? void 0 : options.listeners) === null || _b === void 0 ? void 0 : _b.stderr; + const stdErrListener = (data) => { + stderr += stderrDecoder.write(data); + if (originalStdErrListener) { + originalStdErrListener(data); + } + }; + const stdOutListener = (data) => { + stdout += stdoutDecoder.write(data); + if (originalStdoutListener) { + originalStdoutListener(data); + } + }; + const listeners = Object.assign(Object.assign({}, options === null || options === void 0 ? void 0 : options.listeners), { stdout: stdOutListener, stderr: stdErrListener }); + const exitCode = yield exec(commandLine, args, Object.assign(Object.assign({}, options), { listeners })); + //flush any remaining characters + stdout += stdoutDecoder.end(); + stderr += stderrDecoder.end(); + return { + exitCode, + stdout, + stderr + }; + }); +} +exports.getExecOutput = getExecOutput; +//# sourceMappingURL=exec.js.map + +/***/ }), + +/***/ 159: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.argStringToArray = exports.ToolRunner = void 0; +const os = __importStar(__nccwpck_require__(87)); +const events = __importStar(__nccwpck_require__(614)); +const child = __importStar(__nccwpck_require__(129)); +const path = __importStar(__nccwpck_require__(622)); +const io = __importStar(__nccwpck_require__(436)); +const ioUtil = __importStar(__nccwpck_require__(962)); +const timers_1 = __nccwpck_require__(213); +/* eslint-disable @typescript-eslint/unbound-method */ +const IS_WINDOWS = process.platform === 'win32'; +/* + * Class for running command line tools. Handles quoting and arg parsing in a platform agnostic way. + */ +class ToolRunner extends events.EventEmitter { + constructor(toolPath, args, options) { + super(); + if (!toolPath) { + throw new Error("Parameter 'toolPath' cannot be null or empty."); + } + this.toolPath = toolPath; + this.args = args || []; + this.options = options || {}; + } + _debug(message) { + if (this.options.listeners && this.options.listeners.debug) { + this.options.listeners.debug(message); + } + } + _getCommandString(options, noPrefix) { + const toolPath = this._getSpawnFileName(); + const args = this._getSpawnArgs(options); + let cmd = noPrefix ? '' : '[command]'; // omit prefix when piped to a second tool + if (IS_WINDOWS) { + // Windows + cmd file + if (this._isCmdFile()) { + cmd += toolPath; + for (const a of args) { + cmd += ` ${a}`; + } + } + // Windows + verbatim + else if (options.windowsVerbatimArguments) { + cmd += `"${toolPath}"`; + for (const a of args) { + cmd += ` ${a}`; + } + } + // Windows (regular) + else { + cmd += this._windowsQuoteCmdArg(toolPath); + for (const a of args) { + cmd += ` ${this._windowsQuoteCmdArg(a)}`; + } + } + } + else { + // OSX/Linux - this can likely be improved with some form of quoting. + // creating processes on Unix is fundamentally different than Windows. + // on Unix, execvp() takes an arg array. + cmd += toolPath; + for (const a of args) { + cmd += ` ${a}`; + } + } + return cmd; + } + _processLineBuffer(data, strBuffer, onLine) { + try { + let s = strBuffer + data.toString(); + let n = s.indexOf(os.EOL); + while (n > -1) { + const line = s.substring(0, n); + onLine(line); + // the rest of the string ... + s = s.substring(n + os.EOL.length); + n = s.indexOf(os.EOL); + } + return s; + } + catch (err) { + // streaming lines to console is best effort. Don't fail a build. + this._debug(`error processing line. Failed with error ${err}`); + return ''; + } + } + _getSpawnFileName() { + if (IS_WINDOWS) { + if (this._isCmdFile()) { + return process.env['COMSPEC'] || 'cmd.exe'; + } + } + return this.toolPath; + } + _getSpawnArgs(options) { + if (IS_WINDOWS) { + if (this._isCmdFile()) { + let argline = `/D /S /C "${this._windowsQuoteCmdArg(this.toolPath)}`; + for (const a of this.args) { + argline += ' '; + argline += options.windowsVerbatimArguments + ? a + : this._windowsQuoteCmdArg(a); + } + argline += '"'; + return [argline]; + } + } + return this.args; + } + _endsWith(str, end) { + return str.endsWith(end); + } + _isCmdFile() { + const upperToolPath = this.toolPath.toUpperCase(); + return (this._endsWith(upperToolPath, '.CMD') || + this._endsWith(upperToolPath, '.BAT')); + } + _windowsQuoteCmdArg(arg) { + // for .exe, apply the normal quoting rules that libuv applies + if (!this._isCmdFile()) { + return this._uvQuoteCmdArg(arg); + } + // otherwise apply quoting rules specific to the cmd.exe command line parser. + // the libuv rules are generic and are not designed specifically for cmd.exe + // command line parser. + // + // for a detailed description of the cmd.exe command line parser, refer to + // http://stackoverflow.com/questions/4094699/how-does-the-windows-command-interpreter-cmd-exe-parse-scripts/7970912#7970912 + // need quotes for empty arg + if (!arg) { + return '""'; + } + // determine whether the arg needs to be quoted + const cmdSpecialChars = [ + ' ', + '\t', + '&', + '(', + ')', + '[', + ']', + '{', + '}', + '^', + '=', + ';', + '!', + "'", + '+', + ',', + '`', + '~', + '|', + '<', + '>', + '"' + ]; + let needsQuotes = false; + for (const char of arg) { + if (cmdSpecialChars.some(x => x === char)) { + needsQuotes = true; + break; + } + } + // short-circuit if quotes not needed + if (!needsQuotes) { + return arg; + } + // the following quoting rules are very similar to the rules that by libuv applies. + // + // 1) wrap the string in quotes + // + // 2) double-up quotes - i.e. " => "" + // + // this is different from the libuv quoting rules. libuv replaces " with \", which unfortunately + // doesn't work well with a cmd.exe command line. + // + // note, replacing " with "" also works well if the arg is passed to a downstream .NET console app. + // for example, the command line: + // foo.exe "myarg:""my val""" + // is parsed by a .NET console app into an arg array: + // [ "myarg:\"my val\"" ] + // which is the same end result when applying libuv quoting rules. although the actual + // command line from libuv quoting rules would look like: + // foo.exe "myarg:\"my val\"" + // + // 3) double-up slashes that precede a quote, + // e.g. hello \world => "hello \world" + // hello\"world => "hello\\""world" + // hello\\"world => "hello\\\\""world" + // hello world\ => "hello world\\" + // + // technically this is not required for a cmd.exe command line, or the batch argument parser. + // the reasons for including this as a .cmd quoting rule are: + // + // a) this is optimized for the scenario where the argument is passed from the .cmd file to an + // external program. many programs (e.g. .NET console apps) rely on the slash-doubling rule. + // + // b) it's what we've been doing previously (by deferring to node default behavior) and we + // haven't heard any complaints about that aspect. + // + // note, a weakness of the quoting rules chosen here, is that % is not escaped. in fact, % cannot be + // escaped when used on the command line directly - even though within a .cmd file % can be escaped + // by using %%. + // + // the saving grace is, on the command line, %var% is left as-is if var is not defined. this contrasts + // the line parsing rules within a .cmd file, where if var is not defined it is replaced with nothing. + // + // one option that was explored was replacing % with ^% - i.e. %var% => ^%var^%. this hack would + // often work, since it is unlikely that var^ would exist, and the ^ character is removed when the + // variable is used. the problem, however, is that ^ is not removed when %* is used to pass the args + // to an external program. + // + // an unexplored potential solution for the % escaping problem, is to create a wrapper .cmd file. + // % can be escaped within a .cmd file. + let reverse = '"'; + let quoteHit = true; + for (let i = arg.length; i > 0; i--) { + // walk the string in reverse + reverse += arg[i - 1]; + if (quoteHit && arg[i - 1] === '\\') { + reverse += '\\'; // double the slash + } + else if (arg[i - 1] === '"') { + quoteHit = true; + reverse += '"'; // double the quote + } + else { + quoteHit = false; + } + } + reverse += '"'; + return reverse + .split('') + .reverse() + .join(''); + } + _uvQuoteCmdArg(arg) { + // Tool runner wraps child_process.spawn() and needs to apply the same quoting as + // Node in certain cases where the undocumented spawn option windowsVerbatimArguments + // is used. + // + // Since this function is a port of quote_cmd_arg from Node 4.x (technically, lib UV, + // see https://github.com/nodejs/node/blob/v4.x/deps/uv/src/win/process.c for details), + // pasting copyright notice from Node within this function: + // + // Copyright Joyent, Inc. and other Node contributors. All rights reserved. + // + // Permission is hereby granted, free of charge, to any person obtaining a copy + // of this software and associated documentation files (the "Software"), to + // deal in the Software without restriction, including without limitation the + // rights to use, copy, modify, merge, publish, distribute, sublicense, and/or + // sell copies of the Software, and to permit persons to whom the Software is + // furnished to do so, subject to the following conditions: + // + // The above copyright notice and this permission notice shall be included in + // all copies or substantial portions of the Software. + // + // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING + // FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS + // IN THE SOFTWARE. + if (!arg) { + // Need double quotation for empty argument + return '""'; + } + if (!arg.includes(' ') && !arg.includes('\t') && !arg.includes('"')) { + // No quotation needed + return arg; + } + if (!arg.includes('"') && !arg.includes('\\')) { + // No embedded double quotes or backslashes, so I can just wrap + // quote marks around the whole thing. + return `"${arg}"`; + } + // Expected input/output: + // input : hello"world + // output: "hello\"world" + // input : hello""world + // output: "hello\"\"world" + // input : hello\world + // output: hello\world + // input : hello\\world + // output: hello\\world + // input : hello\"world + // output: "hello\\\"world" + // input : hello\\"world + // output: "hello\\\\\"world" + // input : hello world\ + // output: "hello world\\" - note the comment in libuv actually reads "hello world\" + // but it appears the comment is wrong, it should be "hello world\\" + let reverse = '"'; + let quoteHit = true; + for (let i = arg.length; i > 0; i--) { + // walk the string in reverse + reverse += arg[i - 1]; + if (quoteHit && arg[i - 1] === '\\') { + reverse += '\\'; + } + else if (arg[i - 1] === '"') { + quoteHit = true; + reverse += '\\'; + } + else { + quoteHit = false; + } + } + reverse += '"'; + return reverse + .split('') + .reverse() + .join(''); + } + _cloneExecOptions(options) { + options = options || {}; + const result = { + cwd: options.cwd || process.cwd(), + env: options.env || process.env, + silent: options.silent || false, + windowsVerbatimArguments: options.windowsVerbatimArguments || false, + failOnStdErr: options.failOnStdErr || false, + ignoreReturnCode: options.ignoreReturnCode || false, + delay: options.delay || 10000 + }; + result.outStream = options.outStream || process.stdout; + result.errStream = options.errStream || process.stderr; + return result; + } + _getSpawnOptions(options, toolPath) { + options = options || {}; + const result = {}; + result.cwd = options.cwd; + result.env = options.env; + result['windowsVerbatimArguments'] = + options.windowsVerbatimArguments || this._isCmdFile(); + if (options.windowsVerbatimArguments) { + result.argv0 = `"${toolPath}"`; + } + return result; + } + /** + * Exec a tool. + * Output will be streamed to the live console. + * Returns promise with return code + * + * @param tool path to tool to exec + * @param options optional exec options. See ExecOptions + * @returns number + */ + exec() { + return __awaiter(this, void 0, void 0, function* () { + // root the tool path if it is unrooted and contains relative pathing + if (!ioUtil.isRooted(this.toolPath) && + (this.toolPath.includes('/') || + (IS_WINDOWS && this.toolPath.includes('\\')))) { + // prefer options.cwd if it is specified, however options.cwd may also need to be rooted + this.toolPath = path.resolve(process.cwd(), this.options.cwd || process.cwd(), this.toolPath); + } + // if the tool is only a file name, then resolve it from the PATH + // otherwise verify it exists (add extension on Windows if necessary) + this.toolPath = yield io.which(this.toolPath, true); + return new Promise((resolve, reject) => __awaiter(this, void 0, void 0, function* () { + this._debug(`exec tool: ${this.toolPath}`); + this._debug('arguments:'); + for (const arg of this.args) { + this._debug(` ${arg}`); + } + const optionsNonNull = this._cloneExecOptions(this.options); + if (!optionsNonNull.silent && optionsNonNull.outStream) { + optionsNonNull.outStream.write(this._getCommandString(optionsNonNull) + os.EOL); + } + const state = new ExecState(optionsNonNull, this.toolPath); + state.on('debug', (message) => { + this._debug(message); + }); + if (this.options.cwd && !(yield ioUtil.exists(this.options.cwd))) { + return reject(new Error(`The cwd: ${this.options.cwd} does not exist!`)); + } + const fileName = this._getSpawnFileName(); + const cp = child.spawn(fileName, this._getSpawnArgs(optionsNonNull), this._getSpawnOptions(this.options, fileName)); + let stdbuffer = ''; + if (cp.stdout) { + cp.stdout.on('data', (data) => { + if (this.options.listeners && this.options.listeners.stdout) { + this.options.listeners.stdout(data); + } + if (!optionsNonNull.silent && optionsNonNull.outStream) { + optionsNonNull.outStream.write(data); + } + stdbuffer = this._processLineBuffer(data, stdbuffer, (line) => { + if (this.options.listeners && this.options.listeners.stdline) { + this.options.listeners.stdline(line); + } + }); + }); + } + let errbuffer = ''; + if (cp.stderr) { + cp.stderr.on('data', (data) => { + state.processStderr = true; + if (this.options.listeners && this.options.listeners.stderr) { + this.options.listeners.stderr(data); + } + if (!optionsNonNull.silent && + optionsNonNull.errStream && + optionsNonNull.outStream) { + const s = optionsNonNull.failOnStdErr + ? optionsNonNull.errStream + : optionsNonNull.outStream; + s.write(data); + } + errbuffer = this._processLineBuffer(data, errbuffer, (line) => { + if (this.options.listeners && this.options.listeners.errline) { + this.options.listeners.errline(line); + } + }); + }); + } + cp.on('error', (err) => { + state.processError = err.message; + state.processExited = true; + state.processClosed = true; + state.CheckComplete(); + }); + cp.on('exit', (code) => { + state.processExitCode = code; + state.processExited = true; + this._debug(`Exit code ${code} received from tool '${this.toolPath}'`); + state.CheckComplete(); + }); + cp.on('close', (code) => { + state.processExitCode = code; + state.processExited = true; + state.processClosed = true; + this._debug(`STDIO streams have closed for tool '${this.toolPath}'`); + state.CheckComplete(); + }); + state.on('done', (error, exitCode) => { + if (stdbuffer.length > 0) { + this.emit('stdline', stdbuffer); + } + if (errbuffer.length > 0) { + this.emit('errline', errbuffer); + } + cp.removeAllListeners(); + if (error) { + reject(error); + } + else { + resolve(exitCode); + } + }); + if (this.options.input) { + if (!cp.stdin) { + throw new Error('child process missing stdin'); + } + cp.stdin.end(this.options.input); + } + })); + }); + } +} +exports.ToolRunner = ToolRunner; +/** + * Convert an arg string to an array of args. Handles escaping + * + * @param argString string of arguments + * @returns string[] array of arguments + */ +function argStringToArray(argString) { + const args = []; + let inQuotes = false; + let escaped = false; + let arg = ''; + function append(c) { + // we only escape double quotes. + if (escaped && c !== '"') { + arg += '\\'; + } + arg += c; + escaped = false; + } + for (let i = 0; i < argString.length; i++) { + const c = argString.charAt(i); + if (c === '"') { + if (!escaped) { + inQuotes = !inQuotes; + } + else { + append(c); + } + continue; + } + if (c === '\\' && escaped) { + append(c); + continue; + } + if (c === '\\' && inQuotes) { + escaped = true; + continue; + } + if (c === ' ' && !inQuotes) { + if (arg.length > 0) { + args.push(arg); + arg = ''; + } + continue; + } + append(c); + } + if (arg.length > 0) { + args.push(arg.trim()); + } + return args; +} +exports.argStringToArray = argStringToArray; +class ExecState extends events.EventEmitter { + constructor(options, toolPath) { + super(); + this.processClosed = false; // tracks whether the process has exited and stdio is closed + this.processError = ''; + this.processExitCode = 0; + this.processExited = false; // tracks whether the process has exited + this.processStderr = false; // tracks whether stderr was written to + this.delay = 10000; // 10 seconds + this.done = false; + this.timeout = null; + if (!toolPath) { + throw new Error('toolPath must not be empty'); + } + this.options = options; + this.toolPath = toolPath; + if (options.delay) { + this.delay = options.delay; + } + } + CheckComplete() { + if (this.done) { + return; + } + if (this.processClosed) { + this._setResult(); + } + else if (this.processExited) { + this.timeout = timers_1.setTimeout(ExecState.HandleTimeout, this.delay, this); + } + } + _debug(message) { + this.emit('debug', message); + } + _setResult() { + // determine whether there is an error + let error; + if (this.processExited) { + if (this.processError) { + error = new Error(`There was an error when attempting to execute the process '${this.toolPath}'. This may indicate the process failed to start. Error: ${this.processError}`); + } + else if (this.processExitCode !== 0 && !this.options.ignoreReturnCode) { + error = new Error(`The process '${this.toolPath}' failed with exit code ${this.processExitCode}`); + } + else if (this.processStderr && this.options.failOnStdErr) { + error = new Error(`The process '${this.toolPath}' failed because one or more lines were written to the STDERR stream`); + } + } + // clear the timeout + if (this.timeout) { + clearTimeout(this.timeout); + this.timeout = null; + } + this.done = true; + this.emit('done', error, this.processExitCode); + } + static HandleTimeout(state) { + if (state.done) { + return; + } + if (!state.processClosed && state.processExited) { + const message = `The STDIO streams did not close within ${state.delay / + 1000} seconds of the exit event from process '${state.toolPath}'. This may indicate a child process inherited the STDIO streams and has not yet exited.`; + state._debug(message); + } + state._setResult(); + } +} +//# sourceMappingURL=toolrunner.js.map + +/***/ }), + +/***/ 702: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + +Object.defineProperty(exports, "__esModule", ({ value: true })); +class BasicCredentialHandler { + constructor(username, password) { + this.username = username; + this.password = password; + } + prepareRequest(options) { + options.headers['Authorization'] = + 'Basic ' + + Buffer.from(this.username + ':' + this.password).toString('base64'); + } + // This handler cannot handle 401 + canHandleAuthentication(response) { + return false; + } + handleAuthentication(httpClient, requestInfo, objs) { + return null; + } +} +exports.BasicCredentialHandler = BasicCredentialHandler; +class BearerCredentialHandler { + constructor(token) { + this.token = token; + } + // currently implements pre-authorization + // TODO: support preAuth = false where it hooks on 401 + prepareRequest(options) { + options.headers['Authorization'] = 'Bearer ' + this.token; + } + // This handler cannot handle 401 + canHandleAuthentication(response) { + return false; + } + handleAuthentication(httpClient, requestInfo, objs) { + return null; + } +} +exports.BearerCredentialHandler = BearerCredentialHandler; +class PersonalAccessTokenCredentialHandler { + constructor(token) { + this.token = token; + } + // currently implements pre-authorization + // TODO: support preAuth = false where it hooks on 401 + prepareRequest(options) { + options.headers['Authorization'] = + 'Basic ' + Buffer.from('PAT:' + this.token).toString('base64'); + } + // This handler cannot handle 401 + canHandleAuthentication(response) { + return false; + } + handleAuthentication(httpClient, requestInfo, objs) { + return null; + } +} +exports.PersonalAccessTokenCredentialHandler = PersonalAccessTokenCredentialHandler; + + +/***/ }), + +/***/ 925: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + +Object.defineProperty(exports, "__esModule", ({ value: true })); +const http = __nccwpck_require__(605); +const https = __nccwpck_require__(211); +const pm = __nccwpck_require__(443); +let tunnel; +var HttpCodes; +(function (HttpCodes) { + HttpCodes[HttpCodes["OK"] = 200] = "OK"; + HttpCodes[HttpCodes["MultipleChoices"] = 300] = "MultipleChoices"; + HttpCodes[HttpCodes["MovedPermanently"] = 301] = "MovedPermanently"; + HttpCodes[HttpCodes["ResourceMoved"] = 302] = "ResourceMoved"; + HttpCodes[HttpCodes["SeeOther"] = 303] = "SeeOther"; + HttpCodes[HttpCodes["NotModified"] = 304] = "NotModified"; + HttpCodes[HttpCodes["UseProxy"] = 305] = "UseProxy"; + HttpCodes[HttpCodes["SwitchProxy"] = 306] = "SwitchProxy"; + HttpCodes[HttpCodes["TemporaryRedirect"] = 307] = "TemporaryRedirect"; + HttpCodes[HttpCodes["PermanentRedirect"] = 308] = "PermanentRedirect"; + HttpCodes[HttpCodes["BadRequest"] = 400] = "BadRequest"; + HttpCodes[HttpCodes["Unauthorized"] = 401] = "Unauthorized"; + HttpCodes[HttpCodes["PaymentRequired"] = 402] = "PaymentRequired"; + HttpCodes[HttpCodes["Forbidden"] = 403] = "Forbidden"; + HttpCodes[HttpCodes["NotFound"] = 404] = "NotFound"; + HttpCodes[HttpCodes["MethodNotAllowed"] = 405] = "MethodNotAllowed"; + HttpCodes[HttpCodes["NotAcceptable"] = 406] = "NotAcceptable"; + HttpCodes[HttpCodes["ProxyAuthenticationRequired"] = 407] = "ProxyAuthenticationRequired"; + HttpCodes[HttpCodes["RequestTimeout"] = 408] = "RequestTimeout"; + HttpCodes[HttpCodes["Conflict"] = 409] = "Conflict"; + HttpCodes[HttpCodes["Gone"] = 410] = "Gone"; + HttpCodes[HttpCodes["TooManyRequests"] = 429] = "TooManyRequests"; + HttpCodes[HttpCodes["InternalServerError"] = 500] = "InternalServerError"; + HttpCodes[HttpCodes["NotImplemented"] = 501] = "NotImplemented"; + HttpCodes[HttpCodes["BadGateway"] = 502] = "BadGateway"; + HttpCodes[HttpCodes["ServiceUnavailable"] = 503] = "ServiceUnavailable"; + HttpCodes[HttpCodes["GatewayTimeout"] = 504] = "GatewayTimeout"; +})(HttpCodes = exports.HttpCodes || (exports.HttpCodes = {})); +var Headers; +(function (Headers) { + Headers["Accept"] = "accept"; + Headers["ContentType"] = "content-type"; +})(Headers = exports.Headers || (exports.Headers = {})); +var MediaTypes; +(function (MediaTypes) { + MediaTypes["ApplicationJson"] = "application/json"; +})(MediaTypes = exports.MediaTypes || (exports.MediaTypes = {})); +/** + * Returns the proxy URL, depending upon the supplied url and proxy environment variables. + * @param serverUrl The server URL where the request will be sent. For example, https://api.github.com + */ +function getProxyUrl(serverUrl) { + let proxyUrl = pm.getProxyUrl(new URL(serverUrl)); + return proxyUrl ? proxyUrl.href : ''; +} +exports.getProxyUrl = getProxyUrl; +const HttpRedirectCodes = [ + HttpCodes.MovedPermanently, + HttpCodes.ResourceMoved, + HttpCodes.SeeOther, + HttpCodes.TemporaryRedirect, + HttpCodes.PermanentRedirect +]; +const HttpResponseRetryCodes = [ + HttpCodes.BadGateway, + HttpCodes.ServiceUnavailable, + HttpCodes.GatewayTimeout +]; +const RetryableHttpVerbs = ['OPTIONS', 'GET', 'DELETE', 'HEAD']; +const ExponentialBackoffCeiling = 10; +const ExponentialBackoffTimeSlice = 5; +class HttpClientError extends Error { + constructor(message, statusCode) { + super(message); + this.name = 'HttpClientError'; + this.statusCode = statusCode; + Object.setPrototypeOf(this, HttpClientError.prototype); + } +} +exports.HttpClientError = HttpClientError; +class HttpClientResponse { + constructor(message) { + this.message = message; + } + readBody() { + return new Promise(async (resolve, reject) => { + let output = Buffer.alloc(0); + this.message.on('data', (chunk) => { + output = Buffer.concat([output, chunk]); + }); + this.message.on('end', () => { + resolve(output.toString()); + }); + }); + } +} +exports.HttpClientResponse = HttpClientResponse; +function isHttps(requestUrl) { + let parsedUrl = new URL(requestUrl); + return parsedUrl.protocol === 'https:'; +} +exports.isHttps = isHttps; +class HttpClient { + constructor(userAgent, handlers, requestOptions) { + this._ignoreSslError = false; + this._allowRedirects = true; + this._allowRedirectDowngrade = false; + this._maxRedirects = 50; + this._allowRetries = false; + this._maxRetries = 1; + this._keepAlive = false; + this._disposed = false; + this.userAgent = userAgent; + this.handlers = handlers || []; + this.requestOptions = requestOptions; + if (requestOptions) { + if (requestOptions.ignoreSslError != null) { + this._ignoreSslError = requestOptions.ignoreSslError; + } + this._socketTimeout = requestOptions.socketTimeout; + if (requestOptions.allowRedirects != null) { + this._allowRedirects = requestOptions.allowRedirects; + } + if (requestOptions.allowRedirectDowngrade != null) { + this._allowRedirectDowngrade = requestOptions.allowRedirectDowngrade; + } + if (requestOptions.maxRedirects != null) { + this._maxRedirects = Math.max(requestOptions.maxRedirects, 0); + } + if (requestOptions.keepAlive != null) { + this._keepAlive = requestOptions.keepAlive; + } + if (requestOptions.allowRetries != null) { + this._allowRetries = requestOptions.allowRetries; + } + if (requestOptions.maxRetries != null) { + this._maxRetries = requestOptions.maxRetries; + } + } + } + options(requestUrl, additionalHeaders) { + return this.request('OPTIONS', requestUrl, null, additionalHeaders || {}); + } + get(requestUrl, additionalHeaders) { + return this.request('GET', requestUrl, null, additionalHeaders || {}); + } + del(requestUrl, additionalHeaders) { + return this.request('DELETE', requestUrl, null, additionalHeaders || {}); + } + post(requestUrl, data, additionalHeaders) { + return this.request('POST', requestUrl, data, additionalHeaders || {}); + } + patch(requestUrl, data, additionalHeaders) { + return this.request('PATCH', requestUrl, data, additionalHeaders || {}); + } + put(requestUrl, data, additionalHeaders) { + return this.request('PUT', requestUrl, data, additionalHeaders || {}); + } + head(requestUrl, additionalHeaders) { + return this.request('HEAD', requestUrl, null, additionalHeaders || {}); + } + sendStream(verb, requestUrl, stream, additionalHeaders) { + return this.request(verb, requestUrl, stream, additionalHeaders); + } + /** + * Gets a typed object from an endpoint + * Be aware that not found returns a null. Other errors (4xx, 5xx) reject the promise + */ + async getJson(requestUrl, additionalHeaders = {}) { + additionalHeaders[Headers.Accept] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.Accept, MediaTypes.ApplicationJson); + let res = await this.get(requestUrl, additionalHeaders); + return this._processResponse(res, this.requestOptions); + } + async postJson(requestUrl, obj, additionalHeaders = {}) { + let data = JSON.stringify(obj, null, 2); + additionalHeaders[Headers.Accept] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.Accept, MediaTypes.ApplicationJson); + additionalHeaders[Headers.ContentType] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.ContentType, MediaTypes.ApplicationJson); + let res = await this.post(requestUrl, data, additionalHeaders); + return this._processResponse(res, this.requestOptions); + } + async putJson(requestUrl, obj, additionalHeaders = {}) { + let data = JSON.stringify(obj, null, 2); + additionalHeaders[Headers.Accept] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.Accept, MediaTypes.ApplicationJson); + additionalHeaders[Headers.ContentType] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.ContentType, MediaTypes.ApplicationJson); + let res = await this.put(requestUrl, data, additionalHeaders); + return this._processResponse(res, this.requestOptions); + } + async patchJson(requestUrl, obj, additionalHeaders = {}) { + let data = JSON.stringify(obj, null, 2); + additionalHeaders[Headers.Accept] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.Accept, MediaTypes.ApplicationJson); + additionalHeaders[Headers.ContentType] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.ContentType, MediaTypes.ApplicationJson); + let res = await this.patch(requestUrl, data, additionalHeaders); + return this._processResponse(res, this.requestOptions); + } + /** + * Makes a raw http request. + * All other methods such as get, post, patch, and request ultimately call this. + * Prefer get, del, post and patch + */ + async request(verb, requestUrl, data, headers) { + if (this._disposed) { + throw new Error('Client has already been disposed.'); + } + let parsedUrl = new URL(requestUrl); + let info = this._prepareRequest(verb, parsedUrl, headers); + // Only perform retries on reads since writes may not be idempotent. + let maxTries = this._allowRetries && RetryableHttpVerbs.indexOf(verb) != -1 + ? this._maxRetries + 1 + : 1; + let numTries = 0; + let response; + while (numTries < maxTries) { + response = await this.requestRaw(info, data); + // Check if it's an authentication challenge + if (response && + response.message && + response.message.statusCode === HttpCodes.Unauthorized) { + let authenticationHandler; + for (let i = 0; i < this.handlers.length; i++) { + if (this.handlers[i].canHandleAuthentication(response)) { + authenticationHandler = this.handlers[i]; + break; + } + } + if (authenticationHandler) { + return authenticationHandler.handleAuthentication(this, info, data); + } + else { + // We have received an unauthorized response but have no handlers to handle it. + // Let the response return to the caller. + return response; + } + } + let redirectsRemaining = this._maxRedirects; + while (HttpRedirectCodes.indexOf(response.message.statusCode) != -1 && + this._allowRedirects && + redirectsRemaining > 0) { + const redirectUrl = response.message.headers['location']; + if (!redirectUrl) { + // if there's no location to redirect to, we won't + break; + } + let parsedRedirectUrl = new URL(redirectUrl); + if (parsedUrl.protocol == 'https:' && + parsedUrl.protocol != parsedRedirectUrl.protocol && + !this._allowRedirectDowngrade) { + throw new Error('Redirect from HTTPS to HTTP protocol. This downgrade is not allowed for security reasons. If you want to allow this behavior, set the allowRedirectDowngrade option to true.'); + } + // we need to finish reading the response before reassigning response + // which will leak the open socket. + await response.readBody(); + // strip authorization header if redirected to a different hostname + if (parsedRedirectUrl.hostname !== parsedUrl.hostname) { + for (let header in headers) { + // header names are case insensitive + if (header.toLowerCase() === 'authorization') { + delete headers[header]; + } + } + } + // let's make the request with the new redirectUrl + info = this._prepareRequest(verb, parsedRedirectUrl, headers); + response = await this.requestRaw(info, data); + redirectsRemaining--; + } + if (HttpResponseRetryCodes.indexOf(response.message.statusCode) == -1) { + // If not a retry code, return immediately instead of retrying + return response; + } + numTries += 1; + if (numTries < maxTries) { + await response.readBody(); + await this._performExponentialBackoff(numTries); + } + } + return response; + } + /** + * Needs to be called if keepAlive is set to true in request options. + */ + dispose() { + if (this._agent) { + this._agent.destroy(); + } + this._disposed = true; + } + /** + * Raw request. + * @param info + * @param data + */ + requestRaw(info, data) { + return new Promise((resolve, reject) => { + let callbackForResult = function (err, res) { + if (err) { + reject(err); + } + resolve(res); + }; + this.requestRawWithCallback(info, data, callbackForResult); + }); + } + /** + * Raw request with callback. + * @param info + * @param data + * @param onResult + */ + requestRawWithCallback(info, data, onResult) { + let socket; + if (typeof data === 'string') { + info.options.headers['Content-Length'] = Buffer.byteLength(data, 'utf8'); + } + let callbackCalled = false; + let handleResult = (err, res) => { + if (!callbackCalled) { + callbackCalled = true; + onResult(err, res); + } + }; + let req = info.httpModule.request(info.options, (msg) => { + let res = new HttpClientResponse(msg); + handleResult(null, res); + }); + req.on('socket', sock => { + socket = sock; + }); + // If we ever get disconnected, we want the socket to timeout eventually + req.setTimeout(this._socketTimeout || 3 * 60000, () => { + if (socket) { + socket.end(); + } + handleResult(new Error('Request timeout: ' + info.options.path), null); + }); + req.on('error', function (err) { + // err has statusCode property + // res should have headers + handleResult(err, null); + }); + if (data && typeof data === 'string') { + req.write(data, 'utf8'); + } + if (data && typeof data !== 'string') { + data.on('close', function () { + req.end(); + }); + data.pipe(req); + } + else { + req.end(); + } + } + /** + * Gets an http agent. This function is useful when you need an http agent that handles + * routing through a proxy server - depending upon the url and proxy environment variables. + * @param serverUrl The server URL where the request will be sent. For example, https://api.github.com + */ + getAgent(serverUrl) { + let parsedUrl = new URL(serverUrl); + return this._getAgent(parsedUrl); + } + _prepareRequest(method, requestUrl, headers) { + const info = {}; + info.parsedUrl = requestUrl; + const usingSsl = info.parsedUrl.protocol === 'https:'; + info.httpModule = usingSsl ? https : http; + const defaultPort = usingSsl ? 443 : 80; + info.options = {}; + info.options.host = info.parsedUrl.hostname; + info.options.port = info.parsedUrl.port + ? parseInt(info.parsedUrl.port) + : defaultPort; + info.options.path = + (info.parsedUrl.pathname || '') + (info.parsedUrl.search || ''); + info.options.method = method; + info.options.headers = this._mergeHeaders(headers); + if (this.userAgent != null) { + info.options.headers['user-agent'] = this.userAgent; + } + info.options.agent = this._getAgent(info.parsedUrl); + // gives handlers an opportunity to participate + if (this.handlers) { + this.handlers.forEach(handler => { + handler.prepareRequest(info.options); + }); + } + return info; + } + _mergeHeaders(headers) { + const lowercaseKeys = obj => Object.keys(obj).reduce((c, k) => ((c[k.toLowerCase()] = obj[k]), c), {}); + if (this.requestOptions && this.requestOptions.headers) { + return Object.assign({}, lowercaseKeys(this.requestOptions.headers), lowercaseKeys(headers)); + } + return lowercaseKeys(headers || {}); + } + _getExistingOrDefaultHeader(additionalHeaders, header, _default) { + const lowercaseKeys = obj => Object.keys(obj).reduce((c, k) => ((c[k.toLowerCase()] = obj[k]), c), {}); + let clientHeader; + if (this.requestOptions && this.requestOptions.headers) { + clientHeader = lowercaseKeys(this.requestOptions.headers)[header]; + } + return additionalHeaders[header] || clientHeader || _default; + } + _getAgent(parsedUrl) { + let agent; + let proxyUrl = pm.getProxyUrl(parsedUrl); + let useProxy = proxyUrl && proxyUrl.hostname; + if (this._keepAlive && useProxy) { + agent = this._proxyAgent; + } + if (this._keepAlive && !useProxy) { + agent = this._agent; + } + // if agent is already assigned use that agent. + if (!!agent) { + return agent; + } + const usingSsl = parsedUrl.protocol === 'https:'; + let maxSockets = 100; + if (!!this.requestOptions) { + maxSockets = this.requestOptions.maxSockets || http.globalAgent.maxSockets; + } + if (useProxy) { + // If using proxy, need tunnel + if (!tunnel) { + tunnel = __nccwpck_require__(294); + } + const agentOptions = { + maxSockets: maxSockets, + keepAlive: this._keepAlive, + proxy: { + ...((proxyUrl.username || proxyUrl.password) && { + proxyAuth: `${proxyUrl.username}:${proxyUrl.password}` + }), + host: proxyUrl.hostname, + port: proxyUrl.port + } + }; + let tunnelAgent; + const overHttps = proxyUrl.protocol === 'https:'; + if (usingSsl) { + tunnelAgent = overHttps ? tunnel.httpsOverHttps : tunnel.httpsOverHttp; + } + else { + tunnelAgent = overHttps ? tunnel.httpOverHttps : tunnel.httpOverHttp; + } + agent = tunnelAgent(agentOptions); + this._proxyAgent = agent; + } + // if reusing agent across request and tunneling agent isn't assigned create a new agent + if (this._keepAlive && !agent) { + const options = { keepAlive: this._keepAlive, maxSockets: maxSockets }; + agent = usingSsl ? new https.Agent(options) : new http.Agent(options); + this._agent = agent; + } + // if not using private agent and tunnel agent isn't setup then use global agent + if (!agent) { + agent = usingSsl ? https.globalAgent : http.globalAgent; + } + if (usingSsl && this._ignoreSslError) { + // we don't want to set NODE_TLS_REJECT_UNAUTHORIZED=0 since that will affect request for entire process + // http.RequestOptions doesn't expose a way to modify RequestOptions.agent.options + // we have to cast it to any and change it directly + agent.options = Object.assign(agent.options || {}, { + rejectUnauthorized: false + }); + } + return agent; + } + _performExponentialBackoff(retryNumber) { + retryNumber = Math.min(ExponentialBackoffCeiling, retryNumber); + const ms = ExponentialBackoffTimeSlice * Math.pow(2, retryNumber); + return new Promise(resolve => setTimeout(() => resolve(), ms)); + } + static dateTimeDeserializer(key, value) { + if (typeof value === 'string') { + let a = new Date(value); + if (!isNaN(a.valueOf())) { + return a; + } + } + return value; + } + async _processResponse(res, options) { + return new Promise(async (resolve, reject) => { + const statusCode = res.message.statusCode; + const response = { + statusCode: statusCode, + result: null, + headers: {} + }; + // not found leads to null obj returned + if (statusCode == HttpCodes.NotFound) { + resolve(response); + } + let obj; + let contents; + // get the result from the body + try { + contents = await res.readBody(); + if (contents && contents.length > 0) { + if (options && options.deserializeDates) { + obj = JSON.parse(contents, HttpClient.dateTimeDeserializer); + } + else { + obj = JSON.parse(contents); + } + response.result = obj; + } + response.headers = res.message.headers; + } + catch (err) { + // Invalid resource (contents not json); leaving result obj null + } + // note that 3xx redirects are handled by the http layer. + if (statusCode > 299) { + let msg; + // if exception/error in body, attempt to get better error + if (obj && obj.message) { + msg = obj.message; + } + else if (contents && contents.length > 0) { + // it may be the case that the exception is in the body message as string + msg = contents; + } + else { + msg = 'Failed request: (' + statusCode + ')'; + } + let err = new HttpClientError(msg, statusCode); + err.result = response.result; + reject(err); + } + else { + resolve(response); + } + }); + } +} +exports.HttpClient = HttpClient; + + +/***/ }), + +/***/ 443: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + +Object.defineProperty(exports, "__esModule", ({ value: true })); +function getProxyUrl(reqUrl) { + let usingSsl = reqUrl.protocol === 'https:'; + let proxyUrl; + if (checkBypass(reqUrl)) { + return proxyUrl; + } + let proxyVar; + if (usingSsl) { + proxyVar = process.env['https_proxy'] || process.env['HTTPS_PROXY']; + } + else { + proxyVar = process.env['http_proxy'] || process.env['HTTP_PROXY']; + } + if (proxyVar) { + proxyUrl = new URL(proxyVar); + } + return proxyUrl; +} +exports.getProxyUrl = getProxyUrl; +function checkBypass(reqUrl) { + if (!reqUrl.hostname) { + return false; + } + let noProxy = process.env['no_proxy'] || process.env['NO_PROXY'] || ''; + if (!noProxy) { + return false; + } + // Determine the request port + let reqPort; + if (reqUrl.port) { + reqPort = Number(reqUrl.port); + } + else if (reqUrl.protocol === 'http:') { + reqPort = 80; + } + else if (reqUrl.protocol === 'https:') { + reqPort = 443; + } + // Format the request hostname and hostname with port + let upperReqHosts = [reqUrl.hostname.toUpperCase()]; + if (typeof reqPort === 'number') { + upperReqHosts.push(`${upperReqHosts[0]}:${reqPort}`); + } + // Compare request host against noproxy + for (let upperNoProxyItem of noProxy + .split(',') + .map(x => x.trim().toUpperCase()) + .filter(x => x)) { + if (upperReqHosts.some(x => x === upperNoProxyItem)) { + return true; + } + } + return false; +} +exports.checkBypass = checkBypass; + + +/***/ }), + +/***/ 962: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +var _a; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.getCmdPath = exports.tryGetExecutablePath = exports.isRooted = exports.isDirectory = exports.exists = exports.IS_WINDOWS = exports.unlink = exports.symlink = exports.stat = exports.rmdir = exports.rename = exports.readlink = exports.readdir = exports.mkdir = exports.lstat = exports.copyFile = exports.chmod = void 0; +const fs = __importStar(__nccwpck_require__(747)); +const path = __importStar(__nccwpck_require__(622)); +_a = fs.promises, exports.chmod = _a.chmod, exports.copyFile = _a.copyFile, exports.lstat = _a.lstat, exports.mkdir = _a.mkdir, exports.readdir = _a.readdir, exports.readlink = _a.readlink, exports.rename = _a.rename, exports.rmdir = _a.rmdir, exports.stat = _a.stat, exports.symlink = _a.symlink, exports.unlink = _a.unlink; +exports.IS_WINDOWS = process.platform === 'win32'; +function exists(fsPath) { + return __awaiter(this, void 0, void 0, function* () { + try { + yield exports.stat(fsPath); + } + catch (err) { + if (err.code === 'ENOENT') { + return false; + } + throw err; + } + return true; + }); +} +exports.exists = exists; +function isDirectory(fsPath, useStat = false) { + return __awaiter(this, void 0, void 0, function* () { + const stats = useStat ? yield exports.stat(fsPath) : yield exports.lstat(fsPath); + return stats.isDirectory(); + }); +} +exports.isDirectory = isDirectory; +/** + * On OSX/Linux, true if path starts with '/'. On Windows, true for paths like: + * \, \hello, \\hello\share, C:, and C:\hello (and corresponding alternate separator cases). + */ +function isRooted(p) { + p = normalizeSeparators(p); + if (!p) { + throw new Error('isRooted() parameter "p" cannot be empty'); + } + if (exports.IS_WINDOWS) { + return (p.startsWith('\\') || /^[A-Z]:/i.test(p) // e.g. \ or \hello or \\hello + ); // e.g. C: or C:\hello + } + return p.startsWith('/'); +} +exports.isRooted = isRooted; +/** + * Best effort attempt to determine whether a file exists and is executable. + * @param filePath file path to check + * @param extensions additional file extensions to try + * @return if file exists and is executable, returns the file path. otherwise empty string. + */ +function tryGetExecutablePath(filePath, extensions) { + return __awaiter(this, void 0, void 0, function* () { + let stats = undefined; + try { + // test file exists + stats = yield exports.stat(filePath); + } + catch (err) { + if (err.code !== 'ENOENT') { + // eslint-disable-next-line no-console + console.log(`Unexpected error attempting to determine if executable file exists '${filePath}': ${err}`); + } + } + if (stats && stats.isFile()) { + if (exports.IS_WINDOWS) { + // on Windows, test for valid extension + const upperExt = path.extname(filePath).toUpperCase(); + if (extensions.some(validExt => validExt.toUpperCase() === upperExt)) { + return filePath; + } + } + else { + if (isUnixExecutable(stats)) { + return filePath; + } + } + } + // try each extension + const originalFilePath = filePath; + for (const extension of extensions) { + filePath = originalFilePath + extension; + stats = undefined; + try { + stats = yield exports.stat(filePath); + } + catch (err) { + if (err.code !== 'ENOENT') { + // eslint-disable-next-line no-console + console.log(`Unexpected error attempting to determine if executable file exists '${filePath}': ${err}`); + } + } + if (stats && stats.isFile()) { + if (exports.IS_WINDOWS) { + // preserve the case of the actual file (since an extension was appended) + try { + const directory = path.dirname(filePath); + const upperName = path.basename(filePath).toUpperCase(); + for (const actualName of yield exports.readdir(directory)) { + if (upperName === actualName.toUpperCase()) { + filePath = path.join(directory, actualName); + break; + } + } + } + catch (err) { + // eslint-disable-next-line no-console + console.log(`Unexpected error attempting to determine the actual case of the file '${filePath}': ${err}`); + } + return filePath; + } + else { + if (isUnixExecutable(stats)) { + return filePath; + } + } + } + } + return ''; + }); +} +exports.tryGetExecutablePath = tryGetExecutablePath; +function normalizeSeparators(p) { + p = p || ''; + if (exports.IS_WINDOWS) { + // convert slashes on Windows + p = p.replace(/\//g, '\\'); + // remove redundant slashes + return p.replace(/\\\\+/g, '\\'); + } + // remove redundant slashes + return p.replace(/\/\/+/g, '/'); +} +// on Mac/Linux, test the execute bit +// R W X R W X R W X +// 256 128 64 32 16 8 4 2 1 +function isUnixExecutable(stats) { + return ((stats.mode & 1) > 0 || + ((stats.mode & 8) > 0 && stats.gid === process.getgid()) || + ((stats.mode & 64) > 0 && stats.uid === process.getuid())); +} +// Get the path of cmd.exe in windows +function getCmdPath() { + var _a; + return (_a = process.env['COMSPEC']) !== null && _a !== void 0 ? _a : `cmd.exe`; +} +exports.getCmdPath = getCmdPath; +//# sourceMappingURL=io-util.js.map + +/***/ }), + +/***/ 436: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.findInPath = exports.which = exports.mkdirP = exports.rmRF = exports.mv = exports.cp = void 0; +const assert_1 = __nccwpck_require__(357); +const childProcess = __importStar(__nccwpck_require__(129)); +const path = __importStar(__nccwpck_require__(622)); +const util_1 = __nccwpck_require__(669); +const ioUtil = __importStar(__nccwpck_require__(962)); +const exec = util_1.promisify(childProcess.exec); +const execFile = util_1.promisify(childProcess.execFile); +/** + * Copies a file or folder. + * Based off of shelljs - https://github.com/shelljs/shelljs/blob/9237f66c52e5daa40458f94f9565e18e8132f5a6/src/cp.js + * + * @param source source path + * @param dest destination path + * @param options optional. See CopyOptions. + */ +function cp(source, dest, options = {}) { + return __awaiter(this, void 0, void 0, function* () { + const { force, recursive, copySourceDirectory } = readCopyOptions(options); + const destStat = (yield ioUtil.exists(dest)) ? yield ioUtil.stat(dest) : null; + // Dest is an existing file, but not forcing + if (destStat && destStat.isFile() && !force) { + return; + } + // If dest is an existing directory, should copy inside. + const newDest = destStat && destStat.isDirectory() && copySourceDirectory + ? path.join(dest, path.basename(source)) + : dest; + if (!(yield ioUtil.exists(source))) { + throw new Error(`no such file or directory: ${source}`); + } + const sourceStat = yield ioUtil.stat(source); + if (sourceStat.isDirectory()) { + if (!recursive) { + throw new Error(`Failed to copy. ${source} is a directory, but tried to copy without recursive flag.`); + } + else { + yield cpDirRecursive(source, newDest, 0, force); + } + } + else { + if (path.relative(source, newDest) === '') { + // a file cannot be copied to itself + throw new Error(`'${newDest}' and '${source}' are the same file`); + } + yield copyFile(source, newDest, force); + } + }); +} +exports.cp = cp; +/** + * Moves a path. + * + * @param source source path + * @param dest destination path + * @param options optional. See MoveOptions. + */ +function mv(source, dest, options = {}) { + return __awaiter(this, void 0, void 0, function* () { + if (yield ioUtil.exists(dest)) { + let destExists = true; + if (yield ioUtil.isDirectory(dest)) { + // If dest is directory copy src into dest + dest = path.join(dest, path.basename(source)); + destExists = yield ioUtil.exists(dest); + } + if (destExists) { + if (options.force == null || options.force) { + yield rmRF(dest); + } + else { + throw new Error('Destination already exists'); + } + } + } + yield mkdirP(path.dirname(dest)); + yield ioUtil.rename(source, dest); + }); +} +exports.mv = mv; +/** + * Remove a path recursively with force + * + * @param inputPath path to remove + */ +function rmRF(inputPath) { + return __awaiter(this, void 0, void 0, function* () { + if (ioUtil.IS_WINDOWS) { + // Node doesn't provide a delete operation, only an unlink function. This means that if the file is being used by another + // program (e.g. antivirus), it won't be deleted. To address this, we shell out the work to rd/del. + // Check for invalid characters + // https://docs.microsoft.com/en-us/windows/win32/fileio/naming-a-file + if (/[*"<>|]/.test(inputPath)) { + throw new Error('File path must not contain `*`, `"`, `<`, `>` or `|` on Windows'); + } + try { + const cmdPath = ioUtil.getCmdPath(); + if (yield ioUtil.isDirectory(inputPath, true)) { + yield exec(`${cmdPath} /s /c "rd /s /q "%inputPath%""`, { + env: { inputPath } + }); + } + else { + yield exec(`${cmdPath} /s /c "del /f /a "%inputPath%""`, { + env: { inputPath } + }); + } + } + catch (err) { + // if you try to delete a file that doesn't exist, desired result is achieved + // other errors are valid + if (err.code !== 'ENOENT') + throw err; + } + // Shelling out fails to remove a symlink folder with missing source, this unlink catches that + try { + yield ioUtil.unlink(inputPath); + } + catch (err) { + // if you try to delete a file that doesn't exist, desired result is achieved + // other errors are valid + if (err.code !== 'ENOENT') + throw err; + } + } + else { + let isDir = false; + try { + isDir = yield ioUtil.isDirectory(inputPath); + } + catch (err) { + // if you try to delete a file that doesn't exist, desired result is achieved + // other errors are valid + if (err.code !== 'ENOENT') + throw err; + return; + } + if (isDir) { + yield execFile(`rm`, [`-rf`, `${inputPath}`]); + } + else { + yield ioUtil.unlink(inputPath); + } + } + }); +} +exports.rmRF = rmRF; +/** + * Make a directory. Creates the full path with folders in between + * Will throw if it fails + * + * @param fsPath path to create + * @returns Promise + */ +function mkdirP(fsPath) { + return __awaiter(this, void 0, void 0, function* () { + assert_1.ok(fsPath, 'a path argument must be provided'); + yield ioUtil.mkdir(fsPath, { recursive: true }); + }); +} +exports.mkdirP = mkdirP; +/** + * Returns path of a tool had the tool actually been invoked. Resolves via paths. + * If you check and the tool does not exist, it will throw. + * + * @param tool name of the tool + * @param check whether to check if tool exists + * @returns Promise path to tool + */ +function which(tool, check) { + return __awaiter(this, void 0, void 0, function* () { + if (!tool) { + throw new Error("parameter 'tool' is required"); + } + // recursive when check=true + if (check) { + const result = yield which(tool, false); + if (!result) { + if (ioUtil.IS_WINDOWS) { + throw new Error(`Unable to locate executable file: ${tool}. Please verify either the file path exists or the file can be found within a directory specified by the PATH environment variable. Also verify the file has a valid extension for an executable file.`); + } + else { + throw new Error(`Unable to locate executable file: ${tool}. Please verify either the file path exists or the file can be found within a directory specified by the PATH environment variable. Also check the file mode to verify the file is executable.`); + } + } + return result; + } + const matches = yield findInPath(tool); + if (matches && matches.length > 0) { + return matches[0]; + } + return ''; + }); +} +exports.which = which; +/** + * Returns a list of all occurrences of the given tool on the system path. + * + * @returns Promise the paths of the tool + */ +function findInPath(tool) { + return __awaiter(this, void 0, void 0, function* () { + if (!tool) { + throw new Error("parameter 'tool' is required"); + } + // build the list of extensions to try + const extensions = []; + if (ioUtil.IS_WINDOWS && process.env['PATHEXT']) { + for (const extension of process.env['PATHEXT'].split(path.delimiter)) { + if (extension) { + extensions.push(extension); + } + } + } + // if it's rooted, return it if exists. otherwise return empty. + if (ioUtil.isRooted(tool)) { + const filePath = yield ioUtil.tryGetExecutablePath(tool, extensions); + if (filePath) { + return [filePath]; + } + return []; + } + // if any path separators, return empty + if (tool.includes(path.sep)) { + return []; + } + // build the list of directories + // + // Note, technically "where" checks the current directory on Windows. From a toolkit perspective, + // it feels like we should not do this. Checking the current directory seems like more of a use + // case of a shell, and the which() function exposed by the toolkit should strive for consistency + // across platforms. + const directories = []; + if (process.env.PATH) { + for (const p of process.env.PATH.split(path.delimiter)) { + if (p) { + directories.push(p); + } + } + } + // find all matches + const matches = []; + for (const directory of directories) { + const filePath = yield ioUtil.tryGetExecutablePath(path.join(directory, tool), extensions); + if (filePath) { + matches.push(filePath); + } + } + return matches; + }); +} +exports.findInPath = findInPath; +function readCopyOptions(options) { + const force = options.force == null ? true : options.force; + const recursive = Boolean(options.recursive); + const copySourceDirectory = options.copySourceDirectory == null + ? true + : Boolean(options.copySourceDirectory); + return { force, recursive, copySourceDirectory }; +} +function cpDirRecursive(sourceDir, destDir, currentDepth, force) { + return __awaiter(this, void 0, void 0, function* () { + // Ensure there is not a run away recursive copy + if (currentDepth >= 255) + return; + currentDepth++; + yield mkdirP(destDir); + const files = yield ioUtil.readdir(sourceDir); + for (const fileName of files) { + const srcFile = `${sourceDir}/${fileName}`; + const destFile = `${destDir}/${fileName}`; + const srcFileStat = yield ioUtil.lstat(srcFile); + if (srcFileStat.isDirectory()) { + // Recurse + yield cpDirRecursive(srcFile, destFile, currentDepth, force); + } + else { + yield copyFile(srcFile, destFile, force); + } + } + // Change the mode for the newly created directory + yield ioUtil.chmod(destDir, (yield ioUtil.stat(sourceDir)).mode); + }); +} +// Buffered file copy +function copyFile(srcFile, destFile, force) { + return __awaiter(this, void 0, void 0, function* () { + if ((yield ioUtil.lstat(srcFile)).isSymbolicLink()) { + // unlink/re-link it + try { + yield ioUtil.lstat(destFile); + yield ioUtil.unlink(destFile); + } + catch (e) { + // Try to override file permission + if (e.code === 'EPERM') { + yield ioUtil.chmod(destFile, '0666'); + yield ioUtil.unlink(destFile); + } + // other errors = it doesn't exist, no work to do + } + // Copy over symlink + const symlinkFull = yield ioUtil.readlink(srcFile); + yield ioUtil.symlink(symlinkFull, destFile, ioUtil.IS_WINDOWS ? 'junction' : null); + } + else if (!(yield ioUtil.exists(destFile)) || force) { + yield ioUtil.copyFile(srcFile, destFile); + } + }); +} +//# sourceMappingURL=io.js.map + +/***/ }), + +/***/ 473: +/***/ (function(module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports._readLinuxVersionFile = exports._getOsVersion = exports._findMatch = void 0; +const semver = __importStar(__nccwpck_require__(562)); +const core_1 = __nccwpck_require__(186); +// needs to be require for core node modules to be mocked +/* eslint @typescript-eslint/no-require-imports: 0 */ +const os = __nccwpck_require__(87); +const cp = __nccwpck_require__(129); +const fs = __nccwpck_require__(747); +function _findMatch(versionSpec, stable, candidates, archFilter) { + return __awaiter(this, void 0, void 0, function* () { + const platFilter = os.platform(); + let result; + let match; + let file; + for (const candidate of candidates) { + const version = candidate.version; + core_1.debug(`check ${version} satisfies ${versionSpec}`); + if (semver.satisfies(version, versionSpec) && + (!stable || candidate.stable === stable)) { + file = candidate.files.find(item => { + core_1.debug(`${item.arch}===${archFilter} && ${item.platform}===${platFilter}`); + let chk = item.arch === archFilter && item.platform === platFilter; + if (chk && item.platform_version) { + const osVersion = module.exports._getOsVersion(); + if (osVersion === item.platform_version) { + chk = true; + } + else { + chk = semver.satisfies(osVersion, item.platform_version); + } + } + return chk; + }); + if (file) { + core_1.debug(`matched ${candidate.version}`); + match = candidate; + break; + } + } + } + if (match && file) { + // clone since we're mutating the file list to be only the file that matches + result = Object.assign({}, match); + result.files = [file]; + } + return result; + }); +} +exports._findMatch = _findMatch; +function _getOsVersion() { + // TODO: add windows and other linux, arm variants + // right now filtering on version is only an ubuntu and macos scenario for tools we build for hosted (python) + const plat = os.platform(); + let version = ''; + if (plat === 'darwin') { + version = cp.execSync('sw_vers -productVersion').toString(); + } + else if (plat === 'linux') { + // lsb_release process not in some containers, readfile + // Run cat /etc/lsb-release + // DISTRIB_ID=Ubuntu + // DISTRIB_RELEASE=18.04 + // DISTRIB_CODENAME=bionic + // DISTRIB_DESCRIPTION="Ubuntu 18.04.4 LTS" + const lsbContents = module.exports._readLinuxVersionFile(); + if (lsbContents) { + const lines = lsbContents.split('\n'); + for (const line of lines) { + const parts = line.split('='); + if (parts.length === 2 && + (parts[0].trim() === 'VERSION_ID' || + parts[0].trim() === 'DISTRIB_RELEASE')) { + version = parts[1] + .trim() + .replace(/^"/, '') + .replace(/"$/, ''); + break; + } + } + } + } + return version; +} +exports._getOsVersion = _getOsVersion; +function _readLinuxVersionFile() { + const lsbReleaseFile = '/etc/lsb-release'; + const osReleaseFile = '/etc/os-release'; + let contents = ''; + if (fs.existsSync(lsbReleaseFile)) { + contents = fs.readFileSync(lsbReleaseFile).toString(); + } + else if (fs.existsSync(osReleaseFile)) { + contents = fs.readFileSync(osReleaseFile).toString(); + } + return contents; +} +exports._readLinuxVersionFile = _readLinuxVersionFile; +//# sourceMappingURL=manifest.js.map + +/***/ }), + +/***/ 279: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.RetryHelper = void 0; +const core = __importStar(__nccwpck_require__(186)); +/** + * Internal class for retries + */ +class RetryHelper { + constructor(maxAttempts, minSeconds, maxSeconds) { + if (maxAttempts < 1) { + throw new Error('max attempts should be greater than or equal to 1'); + } + this.maxAttempts = maxAttempts; + this.minSeconds = Math.floor(minSeconds); + this.maxSeconds = Math.floor(maxSeconds); + if (this.minSeconds > this.maxSeconds) { + throw new Error('min seconds should be less than or equal to max seconds'); + } + } + execute(action, isRetryable) { + return __awaiter(this, void 0, void 0, function* () { + let attempt = 1; + while (attempt < this.maxAttempts) { + // Try + try { + return yield action(); + } + catch (err) { + if (isRetryable && !isRetryable(err)) { + throw err; + } + core.info(err.message); + } + // Sleep + const seconds = this.getSleepAmount(); + core.info(`Waiting ${seconds} seconds before trying again`); + yield this.sleep(seconds); + attempt++; + } + // Last attempt + return yield action(); + }); + } + getSleepAmount() { + return (Math.floor(Math.random() * (this.maxSeconds - this.minSeconds + 1)) + + this.minSeconds); + } + sleep(seconds) { + return __awaiter(this, void 0, void 0, function* () { + return new Promise(resolve => setTimeout(resolve, seconds * 1000)); + }); + } +} +exports.RetryHelper = RetryHelper; +//# sourceMappingURL=retry-helper.js.map + +/***/ }), + +/***/ 784: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +var __importDefault = (this && this.__importDefault) || function (mod) { + return (mod && mod.__esModule) ? mod : { "default": mod }; +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.evaluateVersions = exports.isExplicitVersion = exports.findFromManifest = exports.getManifestFromRepo = exports.findAllVersions = exports.find = exports.cacheFile = exports.cacheDir = exports.extractZip = exports.extractXar = exports.extractTar = exports.extract7z = exports.downloadTool = exports.HTTPError = void 0; +const core = __importStar(__nccwpck_require__(186)); +const io = __importStar(__nccwpck_require__(436)); +const fs = __importStar(__nccwpck_require__(747)); +const mm = __importStar(__nccwpck_require__(473)); +const os = __importStar(__nccwpck_require__(87)); +const path = __importStar(__nccwpck_require__(622)); +const httpm = __importStar(__nccwpck_require__(925)); +const semver = __importStar(__nccwpck_require__(562)); +const stream = __importStar(__nccwpck_require__(413)); +const util = __importStar(__nccwpck_require__(669)); +const v4_1 = __importDefault(__nccwpck_require__(824)); +const exec_1 = __nccwpck_require__(514); +const assert_1 = __nccwpck_require__(357); +const retry_helper_1 = __nccwpck_require__(279); +class HTTPError extends Error { + constructor(httpStatusCode) { + super(`Unexpected HTTP response: ${httpStatusCode}`); + this.httpStatusCode = httpStatusCode; + Object.setPrototypeOf(this, new.target.prototype); + } +} +exports.HTTPError = HTTPError; +const IS_WINDOWS = process.platform === 'win32'; +const IS_MAC = process.platform === 'darwin'; +const userAgent = 'actions/tool-cache'; +/** + * Download a tool from an url and stream it into a file + * + * @param url url of tool to download + * @param dest path to download tool + * @param auth authorization header + * @param headers other headers + * @returns path to downloaded tool + */ +function downloadTool(url, dest, auth, headers) { + return __awaiter(this, void 0, void 0, function* () { + dest = dest || path.join(_getTempDirectory(), v4_1.default()); + yield io.mkdirP(path.dirname(dest)); + core.debug(`Downloading ${url}`); + core.debug(`Destination ${dest}`); + const maxAttempts = 3; + const minSeconds = _getGlobal('TEST_DOWNLOAD_TOOL_RETRY_MIN_SECONDS', 10); + const maxSeconds = _getGlobal('TEST_DOWNLOAD_TOOL_RETRY_MAX_SECONDS', 20); + const retryHelper = new retry_helper_1.RetryHelper(maxAttempts, minSeconds, maxSeconds); + return yield retryHelper.execute(() => __awaiter(this, void 0, void 0, function* () { + return yield downloadToolAttempt(url, dest || '', auth, headers); + }), (err) => { + if (err instanceof HTTPError && err.httpStatusCode) { + // Don't retry anything less than 500, except 408 Request Timeout and 429 Too Many Requests + if (err.httpStatusCode < 500 && + err.httpStatusCode !== 408 && + err.httpStatusCode !== 429) { + return false; + } + } + // Otherwise retry + return true; + }); + }); +} +exports.downloadTool = downloadTool; +function downloadToolAttempt(url, dest, auth, headers) { + return __awaiter(this, void 0, void 0, function* () { + if (fs.existsSync(dest)) { + throw new Error(`Destination file path ${dest} already exists`); + } + // Get the response headers + const http = new httpm.HttpClient(userAgent, [], { + allowRetries: false + }); + if (auth) { + core.debug('set auth'); + if (headers === undefined) { + headers = {}; + } + headers.authorization = auth; + } + const response = yield http.get(url, headers); + if (response.message.statusCode !== 200) { + const err = new HTTPError(response.message.statusCode); + core.debug(`Failed to download from "${url}". Code(${response.message.statusCode}) Message(${response.message.statusMessage})`); + throw err; + } + // Download the response body + const pipeline = util.promisify(stream.pipeline); + const responseMessageFactory = _getGlobal('TEST_DOWNLOAD_TOOL_RESPONSE_MESSAGE_FACTORY', () => response.message); + const readStream = responseMessageFactory(); + let succeeded = false; + try { + yield pipeline(readStream, fs.createWriteStream(dest)); + core.debug('download complete'); + succeeded = true; + return dest; + } + finally { + // Error, delete dest before retry + if (!succeeded) { + core.debug('download failed'); + try { + yield io.rmRF(dest); + } + catch (err) { + core.debug(`Failed to delete '${dest}'. ${err.message}`); + } + } + } + }); +} +/** + * Extract a .7z file + * + * @param file path to the .7z file + * @param dest destination directory. Optional. + * @param _7zPath path to 7zr.exe. Optional, for long path support. Most .7z archives do not have this + * problem. If your .7z archive contains very long paths, you can pass the path to 7zr.exe which will + * gracefully handle long paths. By default 7zdec.exe is used because it is a very small program and is + * bundled with the tool lib. However it does not support long paths. 7zr.exe is the reduced command line + * interface, it is smaller than the full command line interface, and it does support long paths. At the + * time of this writing, it is freely available from the LZMA SDK that is available on the 7zip website. + * Be sure to check the current license agreement. If 7zr.exe is bundled with your action, then the path + * to 7zr.exe can be pass to this function. + * @returns path to the destination directory + */ +function extract7z(file, dest, _7zPath) { + return __awaiter(this, void 0, void 0, function* () { + assert_1.ok(IS_WINDOWS, 'extract7z() not supported on current OS'); + assert_1.ok(file, 'parameter "file" is required'); + dest = yield _createExtractFolder(dest); + const originalCwd = process.cwd(); + process.chdir(dest); + if (_7zPath) { + try { + const logLevel = core.isDebug() ? '-bb1' : '-bb0'; + const args = [ + 'x', + logLevel, + '-bd', + '-sccUTF-8', + file + ]; + const options = { + silent: true + }; + yield exec_1.exec(`"${_7zPath}"`, args, options); + } + finally { + process.chdir(originalCwd); + } + } + else { + const escapedScript = path + .join(__dirname, '..', 'scripts', 'Invoke-7zdec.ps1') + .replace(/'/g, "''") + .replace(/"|\n|\r/g, ''); // double-up single quotes, remove double quotes and newlines + const escapedFile = file.replace(/'/g, "''").replace(/"|\n|\r/g, ''); + const escapedTarget = dest.replace(/'/g, "''").replace(/"|\n|\r/g, ''); + const command = `& '${escapedScript}' -Source '${escapedFile}' -Target '${escapedTarget}'`; + const args = [ + '-NoLogo', + '-Sta', + '-NoProfile', + '-NonInteractive', + '-ExecutionPolicy', + 'Unrestricted', + '-Command', + command + ]; + const options = { + silent: true + }; + try { + const powershellPath = yield io.which('powershell', true); + yield exec_1.exec(`"${powershellPath}"`, args, options); + } + finally { + process.chdir(originalCwd); + } + } + return dest; + }); +} +exports.extract7z = extract7z; +/** + * Extract a compressed tar archive + * + * @param file path to the tar + * @param dest destination directory. Optional. + * @param flags flags for the tar command to use for extraction. Defaults to 'xz' (extracting gzipped tars). Optional. + * @returns path to the destination directory + */ +function extractTar(file, dest, flags = 'xz') { + return __awaiter(this, void 0, void 0, function* () { + if (!file) { + throw new Error("parameter 'file' is required"); + } + // Create dest + dest = yield _createExtractFolder(dest); + // Determine whether GNU tar + core.debug('Checking tar --version'); + let versionOutput = ''; + yield exec_1.exec('tar --version', [], { + ignoreReturnCode: true, + silent: true, + listeners: { + stdout: (data) => (versionOutput += data.toString()), + stderr: (data) => (versionOutput += data.toString()) + } + }); + core.debug(versionOutput.trim()); + const isGnuTar = versionOutput.toUpperCase().includes('GNU TAR'); + // Initialize args + let args; + if (flags instanceof Array) { + args = flags; + } + else { + args = [flags]; + } + if (core.isDebug() && !flags.includes('v')) { + args.push('-v'); + } + let destArg = dest; + let fileArg = file; + if (IS_WINDOWS && isGnuTar) { + args.push('--force-local'); + destArg = dest.replace(/\\/g, '/'); + // Technically only the dest needs to have `/` but for aesthetic consistency + // convert slashes in the file arg too. + fileArg = file.replace(/\\/g, '/'); + } + if (isGnuTar) { + // Suppress warnings when using GNU tar to extract archives created by BSD tar + args.push('--warning=no-unknown-keyword'); + args.push('--overwrite'); + } + args.push('-C', destArg, '-f', fileArg); + yield exec_1.exec(`tar`, args); + return dest; + }); +} +exports.extractTar = extractTar; +/** + * Extract a xar compatible archive + * + * @param file path to the archive + * @param dest destination directory. Optional. + * @param flags flags for the xar. Optional. + * @returns path to the destination directory + */ +function extractXar(file, dest, flags = []) { + return __awaiter(this, void 0, void 0, function* () { + assert_1.ok(IS_MAC, 'extractXar() not supported on current OS'); + assert_1.ok(file, 'parameter "file" is required'); + dest = yield _createExtractFolder(dest); + let args; + if (flags instanceof Array) { + args = flags; + } + else { + args = [flags]; + } + args.push('-x', '-C', dest, '-f', file); + if (core.isDebug()) { + args.push('-v'); + } + const xarPath = yield io.which('xar', true); + yield exec_1.exec(`"${xarPath}"`, _unique(args)); + return dest; + }); +} +exports.extractXar = extractXar; +/** + * Extract a zip + * + * @param file path to the zip + * @param dest destination directory. Optional. + * @returns path to the destination directory + */ +function extractZip(file, dest) { + return __awaiter(this, void 0, void 0, function* () { + if (!file) { + throw new Error("parameter 'file' is required"); + } + dest = yield _createExtractFolder(dest); + if (IS_WINDOWS) { + yield extractZipWin(file, dest); + } + else { + yield extractZipNix(file, dest); + } + return dest; + }); +} +exports.extractZip = extractZip; +function extractZipWin(file, dest) { + return __awaiter(this, void 0, void 0, function* () { + // build the powershell command + const escapedFile = file.replace(/'/g, "''").replace(/"|\n|\r/g, ''); // double-up single quotes, remove double quotes and newlines + const escapedDest = dest.replace(/'/g, "''").replace(/"|\n|\r/g, ''); + const pwshPath = yield io.which('pwsh', false); + //To match the file overwrite behavior on nix systems, we use the overwrite = true flag for ExtractToDirectory + //and the -Force flag for Expand-Archive as a fallback + if (pwshPath) { + //attempt to use pwsh with ExtractToDirectory, if this fails attempt Expand-Archive + const pwshCommand = [ + `$ErrorActionPreference = 'Stop' ;`, + `try { Add-Type -AssemblyName System.IO.Compression.ZipFile } catch { } ;`, + `try { [System.IO.Compression.ZipFile]::ExtractToDirectory('${escapedFile}', '${escapedDest}', $true) }`, + `catch { if (($_.Exception.GetType().FullName -eq 'System.Management.Automation.MethodException') -or ($_.Exception.GetType().FullName -eq 'System.Management.Automation.RuntimeException') ){ Expand-Archive -LiteralPath '${escapedFile}' -DestinationPath '${escapedDest}' -Force } else { throw $_ } } ;` + ].join(' '); + const args = [ + '-NoLogo', + '-NoProfile', + '-NonInteractive', + '-ExecutionPolicy', + 'Unrestricted', + '-Command', + pwshCommand + ]; + core.debug(`Using pwsh at path: ${pwshPath}`); + yield exec_1.exec(`"${pwshPath}"`, args); + } + else { + const powershellCommand = [ + `$ErrorActionPreference = 'Stop' ;`, + `try { Add-Type -AssemblyName System.IO.Compression.FileSystem } catch { } ;`, + `if ((Get-Command -Name Expand-Archive -Module Microsoft.PowerShell.Archive -ErrorAction Ignore)) { Expand-Archive -LiteralPath '${escapedFile}' -DestinationPath '${escapedDest}' -Force }`, + `else {[System.IO.Compression.ZipFile]::ExtractToDirectory('${escapedFile}', '${escapedDest}', $true) }` + ].join(' '); + const args = [ + '-NoLogo', + '-Sta', + '-NoProfile', + '-NonInteractive', + '-ExecutionPolicy', + 'Unrestricted', + '-Command', + powershellCommand + ]; + const powershellPath = yield io.which('powershell', true); + core.debug(`Using powershell at path: ${powershellPath}`); + yield exec_1.exec(`"${powershellPath}"`, args); + } + }); +} +function extractZipNix(file, dest) { + return __awaiter(this, void 0, void 0, function* () { + const unzipPath = yield io.which('unzip', true); + const args = [file]; + if (!core.isDebug()) { + args.unshift('-q'); + } + args.unshift('-o'); //overwrite with -o, otherwise a prompt is shown which freezes the run + yield exec_1.exec(`"${unzipPath}"`, args, { cwd: dest }); + }); +} +/** + * Caches a directory and installs it into the tool cacheDir + * + * @param sourceDir the directory to cache into tools + * @param tool tool name + * @param version version of the tool. semver format + * @param arch architecture of the tool. Optional. Defaults to machine architecture + */ +function cacheDir(sourceDir, tool, version, arch) { + return __awaiter(this, void 0, void 0, function* () { + version = semver.clean(version) || version; + arch = arch || os.arch(); + core.debug(`Caching tool ${tool} ${version} ${arch}`); + core.debug(`source dir: ${sourceDir}`); + if (!fs.statSync(sourceDir).isDirectory()) { + throw new Error('sourceDir is not a directory'); + } + // Create the tool dir + const destPath = yield _createToolPath(tool, version, arch); + // copy each child item. do not move. move can fail on Windows + // due to anti-virus software having an open handle on a file. + for (const itemName of fs.readdirSync(sourceDir)) { + const s = path.join(sourceDir, itemName); + yield io.cp(s, destPath, { recursive: true }); + } + // write .complete + _completeToolPath(tool, version, arch); + return destPath; + }); +} +exports.cacheDir = cacheDir; +/** + * Caches a downloaded file (GUID) and installs it + * into the tool cache with a given targetName + * + * @param sourceFile the file to cache into tools. Typically a result of downloadTool which is a guid. + * @param targetFile the name of the file name in the tools directory + * @param tool tool name + * @param version version of the tool. semver format + * @param arch architecture of the tool. Optional. Defaults to machine architecture + */ +function cacheFile(sourceFile, targetFile, tool, version, arch) { + return __awaiter(this, void 0, void 0, function* () { + version = semver.clean(version) || version; + arch = arch || os.arch(); + core.debug(`Caching tool ${tool} ${version} ${arch}`); + core.debug(`source file: ${sourceFile}`); + if (!fs.statSync(sourceFile).isFile()) { + throw new Error('sourceFile is not a file'); + } + // create the tool dir + const destFolder = yield _createToolPath(tool, version, arch); + // copy instead of move. move can fail on Windows due to + // anti-virus software having an open handle on a file. + const destPath = path.join(destFolder, targetFile); + core.debug(`destination file ${destPath}`); + yield io.cp(sourceFile, destPath); + // write .complete + _completeToolPath(tool, version, arch); + return destFolder; + }); +} +exports.cacheFile = cacheFile; +/** + * Finds the path to a tool version in the local installed tool cache + * + * @param toolName name of the tool + * @param versionSpec version of the tool + * @param arch optional arch. defaults to arch of computer + */ +function find(toolName, versionSpec, arch) { + if (!toolName) { + throw new Error('toolName parameter is required'); + } + if (!versionSpec) { + throw new Error('versionSpec parameter is required'); + } + arch = arch || os.arch(); + // attempt to resolve an explicit version + if (!isExplicitVersion(versionSpec)) { + const localVersions = findAllVersions(toolName, arch); + const match = evaluateVersions(localVersions, versionSpec); + versionSpec = match; + } + // check for the explicit version in the cache + let toolPath = ''; + if (versionSpec) { + versionSpec = semver.clean(versionSpec) || ''; + const cachePath = path.join(_getCacheDirectory(), toolName, versionSpec, arch); + core.debug(`checking cache: ${cachePath}`); + if (fs.existsSync(cachePath) && fs.existsSync(`${cachePath}.complete`)) { + core.debug(`Found tool in cache ${toolName} ${versionSpec} ${arch}`); + toolPath = cachePath; + } + else { + core.debug('not found'); + } + } + return toolPath; +} +exports.find = find; +/** + * Finds the paths to all versions of a tool that are installed in the local tool cache + * + * @param toolName name of the tool + * @param arch optional arch. defaults to arch of computer + */ +function findAllVersions(toolName, arch) { + const versions = []; + arch = arch || os.arch(); + const toolPath = path.join(_getCacheDirectory(), toolName); + if (fs.existsSync(toolPath)) { + const children = fs.readdirSync(toolPath); + for (const child of children) { + if (isExplicitVersion(child)) { + const fullPath = path.join(toolPath, child, arch || ''); + if (fs.existsSync(fullPath) && fs.existsSync(`${fullPath}.complete`)) { + versions.push(child); + } + } + } + } + return versions; +} +exports.findAllVersions = findAllVersions; +function getManifestFromRepo(owner, repo, auth, branch = 'master') { + return __awaiter(this, void 0, void 0, function* () { + let releases = []; + const treeUrl = `https://api.github.com/repos/${owner}/${repo}/git/trees/${branch}`; + const http = new httpm.HttpClient('tool-cache'); + const headers = {}; + if (auth) { + core.debug('set auth'); + headers.authorization = auth; + } + const response = yield http.getJson(treeUrl, headers); + if (!response.result) { + return releases; + } + let manifestUrl = ''; + for (const item of response.result.tree) { + if (item.path === 'versions-manifest.json') { + manifestUrl = item.url; + break; + } + } + headers['accept'] = 'application/vnd.github.VERSION.raw'; + let versionsRaw = yield (yield http.get(manifestUrl, headers)).readBody(); + if (versionsRaw) { + // shouldn't be needed but protects against invalid json saved with BOM + versionsRaw = versionsRaw.replace(/^\uFEFF/, ''); + try { + releases = JSON.parse(versionsRaw); + } + catch (_a) { + core.debug('Invalid json'); + } + } + return releases; + }); +} +exports.getManifestFromRepo = getManifestFromRepo; +function findFromManifest(versionSpec, stable, manifest, archFilter = os.arch()) { + return __awaiter(this, void 0, void 0, function* () { + // wrap the internal impl + const match = yield mm._findMatch(versionSpec, stable, manifest, archFilter); + return match; + }); +} +exports.findFromManifest = findFromManifest; +function _createExtractFolder(dest) { + return __awaiter(this, void 0, void 0, function* () { + if (!dest) { + // create a temp dir + dest = path.join(_getTempDirectory(), v4_1.default()); + } + yield io.mkdirP(dest); + return dest; + }); +} +function _createToolPath(tool, version, arch) { + return __awaiter(this, void 0, void 0, function* () { + const folderPath = path.join(_getCacheDirectory(), tool, semver.clean(version) || version, arch || ''); + core.debug(`destination ${folderPath}`); + const markerPath = `${folderPath}.complete`; + yield io.rmRF(folderPath); + yield io.rmRF(markerPath); + yield io.mkdirP(folderPath); + return folderPath; + }); +} +function _completeToolPath(tool, version, arch) { + const folderPath = path.join(_getCacheDirectory(), tool, semver.clean(version) || version, arch || ''); + const markerPath = `${folderPath}.complete`; + fs.writeFileSync(markerPath, ''); + core.debug('finished caching tool'); +} +/** + * Check if version string is explicit + * + * @param versionSpec version string to check + */ +function isExplicitVersion(versionSpec) { + const c = semver.clean(versionSpec) || ''; + core.debug(`isExplicit: ${c}`); + const valid = semver.valid(c) != null; + core.debug(`explicit? ${valid}`); + return valid; +} +exports.isExplicitVersion = isExplicitVersion; +/** + * Get the highest satisfiying semantic version in `versions` which satisfies `versionSpec` + * + * @param versions array of versions to evaluate + * @param versionSpec semantic version spec to satisfy + */ +function evaluateVersions(versions, versionSpec) { + let version = ''; + core.debug(`evaluating ${versions.length} versions`); + versions = versions.sort((a, b) => { + if (semver.gt(a, b)) { + return 1; + } + return -1; + }); + for (let i = versions.length - 1; i >= 0; i--) { + const potential = versions[i]; + const satisfied = semver.satisfies(potential, versionSpec); + if (satisfied) { + version = potential; + break; + } + } + if (version) { + core.debug(`matched: ${version}`); + } + else { + core.debug('match not found'); + } + return version; +} +exports.evaluateVersions = evaluateVersions; +/** + * Gets RUNNER_TOOL_CACHE + */ +function _getCacheDirectory() { + const cacheDirectory = process.env['RUNNER_TOOL_CACHE'] || ''; + assert_1.ok(cacheDirectory, 'Expected RUNNER_TOOL_CACHE to be defined'); + return cacheDirectory; +} +/** + * Gets RUNNER_TEMP + */ +function _getTempDirectory() { + const tempDirectory = process.env['RUNNER_TEMP'] || ''; + assert_1.ok(tempDirectory, 'Expected RUNNER_TEMP to be defined'); + return tempDirectory; +} +/** + * Gets a global variable + */ +function _getGlobal(key, defaultValue) { + /* eslint-disable @typescript-eslint/no-explicit-any */ + const value = global[key]; + /* eslint-enable @typescript-eslint/no-explicit-any */ + return value !== undefined ? value : defaultValue; +} +/** + * Returns an array of unique values. + * @param values Values to make unique. + */ +function _unique(values) { + return Array.from(new Set(values)); +} +//# sourceMappingURL=tool-cache.js.map + +/***/ }), + +/***/ 562: +/***/ ((module, exports) => { + +exports = module.exports = SemVer + +var debug +/* istanbul ignore next */ +if (typeof process === 'object' && + process.env && + process.env.NODE_DEBUG && + /\bsemver\b/i.test(process.env.NODE_DEBUG)) { + debug = function () { + var args = Array.prototype.slice.call(arguments, 0) + args.unshift('SEMVER') + console.log.apply(console, args) + } +} else { + debug = function () {} +} + +// Note: this is the semver.org version of the spec that it implements +// Not necessarily the package version of this code. +exports.SEMVER_SPEC_VERSION = '2.0.0' + +var MAX_LENGTH = 256 +var MAX_SAFE_INTEGER = Number.MAX_SAFE_INTEGER || + /* istanbul ignore next */ 9007199254740991 + +// Max safe segment length for coercion. +var MAX_SAFE_COMPONENT_LENGTH = 16 + +// The actual regexps go on exports.re +var re = exports.re = [] +var src = exports.src = [] +var t = exports.tokens = {} +var R = 0 + +function tok (n) { + t[n] = R++ +} + +// The following Regular Expressions can be used for tokenizing, +// validating, and parsing SemVer version strings. + +// ## Numeric Identifier +// A single `0`, or a non-zero digit followed by zero or more digits. + +tok('NUMERICIDENTIFIER') +src[t.NUMERICIDENTIFIER] = '0|[1-9]\\d*' +tok('NUMERICIDENTIFIERLOOSE') +src[t.NUMERICIDENTIFIERLOOSE] = '[0-9]+' + +// ## Non-numeric Identifier +// Zero or more digits, followed by a letter or hyphen, and then zero or +// more letters, digits, or hyphens. + +tok('NONNUMERICIDENTIFIER') +src[t.NONNUMERICIDENTIFIER] = '\\d*[a-zA-Z-][a-zA-Z0-9-]*' + +// ## Main Version +// Three dot-separated numeric identifiers. + +tok('MAINVERSION') +src[t.MAINVERSION] = '(' + src[t.NUMERICIDENTIFIER] + ')\\.' + + '(' + src[t.NUMERICIDENTIFIER] + ')\\.' + + '(' + src[t.NUMERICIDENTIFIER] + ')' + +tok('MAINVERSIONLOOSE') +src[t.MAINVERSIONLOOSE] = '(' + src[t.NUMERICIDENTIFIERLOOSE] + ')\\.' + + '(' + src[t.NUMERICIDENTIFIERLOOSE] + ')\\.' + + '(' + src[t.NUMERICIDENTIFIERLOOSE] + ')' + +// ## Pre-release Version Identifier +// A numeric identifier, or a non-numeric identifier. + +tok('PRERELEASEIDENTIFIER') +src[t.PRERELEASEIDENTIFIER] = '(?:' + src[t.NUMERICIDENTIFIER] + + '|' + src[t.NONNUMERICIDENTIFIER] + ')' + +tok('PRERELEASEIDENTIFIERLOOSE') +src[t.PRERELEASEIDENTIFIERLOOSE] = '(?:' + src[t.NUMERICIDENTIFIERLOOSE] + + '|' + src[t.NONNUMERICIDENTIFIER] + ')' + +// ## Pre-release Version +// Hyphen, followed by one or more dot-separated pre-release version +// identifiers. + +tok('PRERELEASE') +src[t.PRERELEASE] = '(?:-(' + src[t.PRERELEASEIDENTIFIER] + + '(?:\\.' + src[t.PRERELEASEIDENTIFIER] + ')*))' + +tok('PRERELEASELOOSE') +src[t.PRERELEASELOOSE] = '(?:-?(' + src[t.PRERELEASEIDENTIFIERLOOSE] + + '(?:\\.' + src[t.PRERELEASEIDENTIFIERLOOSE] + ')*))' + +// ## Build Metadata Identifier +// Any combination of digits, letters, or hyphens. + +tok('BUILDIDENTIFIER') +src[t.BUILDIDENTIFIER] = '[0-9A-Za-z-]+' + +// ## Build Metadata +// Plus sign, followed by one or more period-separated build metadata +// identifiers. + +tok('BUILD') +src[t.BUILD] = '(?:\\+(' + src[t.BUILDIDENTIFIER] + + '(?:\\.' + src[t.BUILDIDENTIFIER] + ')*))' + +// ## Full Version String +// A main version, followed optionally by a pre-release version and +// build metadata. + +// Note that the only major, minor, patch, and pre-release sections of +// the version string are capturing groups. The build metadata is not a +// capturing group, because it should not ever be used in version +// comparison. + +tok('FULL') +tok('FULLPLAIN') +src[t.FULLPLAIN] = 'v?' + src[t.MAINVERSION] + + src[t.PRERELEASE] + '?' + + src[t.BUILD] + '?' + +src[t.FULL] = '^' + src[t.FULLPLAIN] + '$' + +// like full, but allows v1.2.3 and =1.2.3, which people do sometimes. +// also, 1.0.0alpha1 (prerelease without the hyphen) which is pretty +// common in the npm registry. +tok('LOOSEPLAIN') +src[t.LOOSEPLAIN] = '[v=\\s]*' + src[t.MAINVERSIONLOOSE] + + src[t.PRERELEASELOOSE] + '?' + + src[t.BUILD] + '?' + +tok('LOOSE') +src[t.LOOSE] = '^' + src[t.LOOSEPLAIN] + '$' + +tok('GTLT') +src[t.GTLT] = '((?:<|>)?=?)' + +// Something like "2.*" or "1.2.x". +// Note that "x.x" is a valid xRange identifer, meaning "any version" +// Only the first item is strictly required. +tok('XRANGEIDENTIFIERLOOSE') +src[t.XRANGEIDENTIFIERLOOSE] = src[t.NUMERICIDENTIFIERLOOSE] + '|x|X|\\*' +tok('XRANGEIDENTIFIER') +src[t.XRANGEIDENTIFIER] = src[t.NUMERICIDENTIFIER] + '|x|X|\\*' + +tok('XRANGEPLAIN') +src[t.XRANGEPLAIN] = '[v=\\s]*(' + src[t.XRANGEIDENTIFIER] + ')' + + '(?:\\.(' + src[t.XRANGEIDENTIFIER] + ')' + + '(?:\\.(' + src[t.XRANGEIDENTIFIER] + ')' + + '(?:' + src[t.PRERELEASE] + ')?' + + src[t.BUILD] + '?' + + ')?)?' + +tok('XRANGEPLAINLOOSE') +src[t.XRANGEPLAINLOOSE] = '[v=\\s]*(' + src[t.XRANGEIDENTIFIERLOOSE] + ')' + + '(?:\\.(' + src[t.XRANGEIDENTIFIERLOOSE] + ')' + + '(?:\\.(' + src[t.XRANGEIDENTIFIERLOOSE] + ')' + + '(?:' + src[t.PRERELEASELOOSE] + ')?' + + src[t.BUILD] + '?' + + ')?)?' + +tok('XRANGE') +src[t.XRANGE] = '^' + src[t.GTLT] + '\\s*' + src[t.XRANGEPLAIN] + '$' +tok('XRANGELOOSE') +src[t.XRANGELOOSE] = '^' + src[t.GTLT] + '\\s*' + src[t.XRANGEPLAINLOOSE] + '$' + +// Coercion. +// Extract anything that could conceivably be a part of a valid semver +tok('COERCE') +src[t.COERCE] = '(^|[^\\d])' + + '(\\d{1,' + MAX_SAFE_COMPONENT_LENGTH + '})' + + '(?:\\.(\\d{1,' + MAX_SAFE_COMPONENT_LENGTH + '}))?' + + '(?:\\.(\\d{1,' + MAX_SAFE_COMPONENT_LENGTH + '}))?' + + '(?:$|[^\\d])' +tok('COERCERTL') +re[t.COERCERTL] = new RegExp(src[t.COERCE], 'g') + +// Tilde ranges. +// Meaning is "reasonably at or greater than" +tok('LONETILDE') +src[t.LONETILDE] = '(?:~>?)' + +tok('TILDETRIM') +src[t.TILDETRIM] = '(\\s*)' + src[t.LONETILDE] + '\\s+' +re[t.TILDETRIM] = new RegExp(src[t.TILDETRIM], 'g') +var tildeTrimReplace = '$1~' + +tok('TILDE') +src[t.TILDE] = '^' + src[t.LONETILDE] + src[t.XRANGEPLAIN] + '$' +tok('TILDELOOSE') +src[t.TILDELOOSE] = '^' + src[t.LONETILDE] + src[t.XRANGEPLAINLOOSE] + '$' + +// Caret ranges. +// Meaning is "at least and backwards compatible with" +tok('LONECARET') +src[t.LONECARET] = '(?:\\^)' + +tok('CARETTRIM') +src[t.CARETTRIM] = '(\\s*)' + src[t.LONECARET] + '\\s+' +re[t.CARETTRIM] = new RegExp(src[t.CARETTRIM], 'g') +var caretTrimReplace = '$1^' + +tok('CARET') +src[t.CARET] = '^' + src[t.LONECARET] + src[t.XRANGEPLAIN] + '$' +tok('CARETLOOSE') +src[t.CARETLOOSE] = '^' + src[t.LONECARET] + src[t.XRANGEPLAINLOOSE] + '$' + +// A simple gt/lt/eq thing, or just "" to indicate "any version" +tok('COMPARATORLOOSE') +src[t.COMPARATORLOOSE] = '^' + src[t.GTLT] + '\\s*(' + src[t.LOOSEPLAIN] + ')$|^$' +tok('COMPARATOR') +src[t.COMPARATOR] = '^' + src[t.GTLT] + '\\s*(' + src[t.FULLPLAIN] + ')$|^$' + +// An expression to strip any whitespace between the gtlt and the thing +// it modifies, so that `> 1.2.3` ==> `>1.2.3` +tok('COMPARATORTRIM') +src[t.COMPARATORTRIM] = '(\\s*)' + src[t.GTLT] + + '\\s*(' + src[t.LOOSEPLAIN] + '|' + src[t.XRANGEPLAIN] + ')' + +// this one has to use the /g flag +re[t.COMPARATORTRIM] = new RegExp(src[t.COMPARATORTRIM], 'g') +var comparatorTrimReplace = '$1$2$3' + +// Something like `1.2.3 - 1.2.4` +// Note that these all use the loose form, because they'll be +// checked against either the strict or loose comparator form +// later. +tok('HYPHENRANGE') +src[t.HYPHENRANGE] = '^\\s*(' + src[t.XRANGEPLAIN] + ')' + + '\\s+-\\s+' + + '(' + src[t.XRANGEPLAIN] + ')' + + '\\s*$' + +tok('HYPHENRANGELOOSE') +src[t.HYPHENRANGELOOSE] = '^\\s*(' + src[t.XRANGEPLAINLOOSE] + ')' + + '\\s+-\\s+' + + '(' + src[t.XRANGEPLAINLOOSE] + ')' + + '\\s*$' + +// Star ranges basically just allow anything at all. +tok('STAR') +src[t.STAR] = '(<|>)?=?\\s*\\*' + +// Compile to actual regexp objects. +// All are flag-free, unless they were created above with a flag. +for (var i = 0; i < R; i++) { + debug(i, src[i]) + if (!re[i]) { + re[i] = new RegExp(src[i]) + } +} + +exports.parse = parse +function parse (version, options) { + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + + if (version instanceof SemVer) { + return version + } + + if (typeof version !== 'string') { + return null + } + + if (version.length > MAX_LENGTH) { + return null + } + + var r = options.loose ? re[t.LOOSE] : re[t.FULL] + if (!r.test(version)) { + return null + } + + try { + return new SemVer(version, options) + } catch (er) { + return null + } +} + +exports.valid = valid +function valid (version, options) { + var v = parse(version, options) + return v ? v.version : null +} + +exports.clean = clean +function clean (version, options) { + var s = parse(version.trim().replace(/^[=v]+/, ''), options) + return s ? s.version : null +} + +exports.SemVer = SemVer + +function SemVer (version, options) { + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + if (version instanceof SemVer) { + if (version.loose === options.loose) { + return version + } else { + version = version.version + } + } else if (typeof version !== 'string') { + throw new TypeError('Invalid Version: ' + version) + } + + if (version.length > MAX_LENGTH) { + throw new TypeError('version is longer than ' + MAX_LENGTH + ' characters') + } + + if (!(this instanceof SemVer)) { + return new SemVer(version, options) + } + + debug('SemVer', version, options) + this.options = options + this.loose = !!options.loose + + var m = version.trim().match(options.loose ? re[t.LOOSE] : re[t.FULL]) + + if (!m) { + throw new TypeError('Invalid Version: ' + version) + } + + this.raw = version + + // these are actually numbers + this.major = +m[1] + this.minor = +m[2] + this.patch = +m[3] + + if (this.major > MAX_SAFE_INTEGER || this.major < 0) { + throw new TypeError('Invalid major version') + } + + if (this.minor > MAX_SAFE_INTEGER || this.minor < 0) { + throw new TypeError('Invalid minor version') + } + + if (this.patch > MAX_SAFE_INTEGER || this.patch < 0) { + throw new TypeError('Invalid patch version') + } + + // numberify any prerelease numeric ids + if (!m[4]) { + this.prerelease = [] + } else { + this.prerelease = m[4].split('.').map(function (id) { + if (/^[0-9]+$/.test(id)) { + var num = +id + if (num >= 0 && num < MAX_SAFE_INTEGER) { + return num + } + } + return id + }) + } + + this.build = m[5] ? m[5].split('.') : [] + this.format() +} + +SemVer.prototype.format = function () { + this.version = this.major + '.' + this.minor + '.' + this.patch + if (this.prerelease.length) { + this.version += '-' + this.prerelease.join('.') + } + return this.version +} + +SemVer.prototype.toString = function () { + return this.version +} + +SemVer.prototype.compare = function (other) { + debug('SemVer.compare', this.version, this.options, other) + if (!(other instanceof SemVer)) { + other = new SemVer(other, this.options) + } + + return this.compareMain(other) || this.comparePre(other) +} + +SemVer.prototype.compareMain = function (other) { + if (!(other instanceof SemVer)) { + other = new SemVer(other, this.options) + } + + return compareIdentifiers(this.major, other.major) || + compareIdentifiers(this.minor, other.minor) || + compareIdentifiers(this.patch, other.patch) +} + +SemVer.prototype.comparePre = function (other) { + if (!(other instanceof SemVer)) { + other = new SemVer(other, this.options) + } + + // NOT having a prerelease is > having one + if (this.prerelease.length && !other.prerelease.length) { + return -1 + } else if (!this.prerelease.length && other.prerelease.length) { + return 1 + } else if (!this.prerelease.length && !other.prerelease.length) { + return 0 + } + + var i = 0 + do { + var a = this.prerelease[i] + var b = other.prerelease[i] + debug('prerelease compare', i, a, b) + if (a === undefined && b === undefined) { + return 0 + } else if (b === undefined) { + return 1 + } else if (a === undefined) { + return -1 + } else if (a === b) { + continue + } else { + return compareIdentifiers(a, b) + } + } while (++i) +} + +SemVer.prototype.compareBuild = function (other) { + if (!(other instanceof SemVer)) { + other = new SemVer(other, this.options) + } + + var i = 0 + do { + var a = this.build[i] + var b = other.build[i] + debug('prerelease compare', i, a, b) + if (a === undefined && b === undefined) { + return 0 + } else if (b === undefined) { + return 1 + } else if (a === undefined) { + return -1 + } else if (a === b) { + continue + } else { + return compareIdentifiers(a, b) + } + } while (++i) +} + +// preminor will bump the version up to the next minor release, and immediately +// down to pre-release. premajor and prepatch work the same way. +SemVer.prototype.inc = function (release, identifier) { + switch (release) { + case 'premajor': + this.prerelease.length = 0 + this.patch = 0 + this.minor = 0 + this.major++ + this.inc('pre', identifier) + break + case 'preminor': + this.prerelease.length = 0 + this.patch = 0 + this.minor++ + this.inc('pre', identifier) + break + case 'prepatch': + // If this is already a prerelease, it will bump to the next version + // drop any prereleases that might already exist, since they are not + // relevant at this point. + this.prerelease.length = 0 + this.inc('patch', identifier) + this.inc('pre', identifier) + break + // If the input is a non-prerelease version, this acts the same as + // prepatch. + case 'prerelease': + if (this.prerelease.length === 0) { + this.inc('patch', identifier) + } + this.inc('pre', identifier) + break + + case 'major': + // If this is a pre-major version, bump up to the same major version. + // Otherwise increment major. + // 1.0.0-5 bumps to 1.0.0 + // 1.1.0 bumps to 2.0.0 + if (this.minor !== 0 || + this.patch !== 0 || + this.prerelease.length === 0) { + this.major++ + } + this.minor = 0 + this.patch = 0 + this.prerelease = [] + break + case 'minor': + // If this is a pre-minor version, bump up to the same minor version. + // Otherwise increment minor. + // 1.2.0-5 bumps to 1.2.0 + // 1.2.1 bumps to 1.3.0 + if (this.patch !== 0 || this.prerelease.length === 0) { + this.minor++ + } + this.patch = 0 + this.prerelease = [] + break + case 'patch': + // If this is not a pre-release version, it will increment the patch. + // If it is a pre-release it will bump up to the same patch version. + // 1.2.0-5 patches to 1.2.0 + // 1.2.0 patches to 1.2.1 + if (this.prerelease.length === 0) { + this.patch++ + } + this.prerelease = [] + break + // This probably shouldn't be used publicly. + // 1.0.0 "pre" would become 1.0.0-0 which is the wrong direction. + case 'pre': + if (this.prerelease.length === 0) { + this.prerelease = [0] + } else { + var i = this.prerelease.length + while (--i >= 0) { + if (typeof this.prerelease[i] === 'number') { + this.prerelease[i]++ + i = -2 + } + } + if (i === -1) { + // didn't increment anything + this.prerelease.push(0) + } + } + if (identifier) { + // 1.2.0-beta.1 bumps to 1.2.0-beta.2, + // 1.2.0-beta.fooblz or 1.2.0-beta bumps to 1.2.0-beta.0 + if (this.prerelease[0] === identifier) { + if (isNaN(this.prerelease[1])) { + this.prerelease = [identifier, 0] + } + } else { + this.prerelease = [identifier, 0] + } + } + break + + default: + throw new Error('invalid increment argument: ' + release) + } + this.format() + this.raw = this.version + return this +} + +exports.inc = inc +function inc (version, release, loose, identifier) { + if (typeof (loose) === 'string') { + identifier = loose + loose = undefined + } + + try { + return new SemVer(version, loose).inc(release, identifier).version + } catch (er) { + return null + } +} + +exports.diff = diff +function diff (version1, version2) { + if (eq(version1, version2)) { + return null + } else { + var v1 = parse(version1) + var v2 = parse(version2) + var prefix = '' + if (v1.prerelease.length || v2.prerelease.length) { + prefix = 'pre' + var defaultResult = 'prerelease' + } + for (var key in v1) { + if (key === 'major' || key === 'minor' || key === 'patch') { + if (v1[key] !== v2[key]) { + return prefix + key + } + } + } + return defaultResult // may be undefined + } +} + +exports.compareIdentifiers = compareIdentifiers + +var numeric = /^[0-9]+$/ +function compareIdentifiers (a, b) { + var anum = numeric.test(a) + var bnum = numeric.test(b) + + if (anum && bnum) { + a = +a + b = +b + } + + return a === b ? 0 + : (anum && !bnum) ? -1 + : (bnum && !anum) ? 1 + : a < b ? -1 + : 1 +} + +exports.rcompareIdentifiers = rcompareIdentifiers +function rcompareIdentifiers (a, b) { + return compareIdentifiers(b, a) +} + +exports.major = major +function major (a, loose) { + return new SemVer(a, loose).major +} + +exports.minor = minor +function minor (a, loose) { + return new SemVer(a, loose).minor +} + +exports.patch = patch +function patch (a, loose) { + return new SemVer(a, loose).patch +} + +exports.compare = compare +function compare (a, b, loose) { + return new SemVer(a, loose).compare(new SemVer(b, loose)) +} + +exports.compareLoose = compareLoose +function compareLoose (a, b) { + return compare(a, b, true) +} + +exports.compareBuild = compareBuild +function compareBuild (a, b, loose) { + var versionA = new SemVer(a, loose) + var versionB = new SemVer(b, loose) + return versionA.compare(versionB) || versionA.compareBuild(versionB) +} + +exports.rcompare = rcompare +function rcompare (a, b, loose) { + return compare(b, a, loose) +} + +exports.sort = sort +function sort (list, loose) { + return list.sort(function (a, b) { + return exports.compareBuild(a, b, loose) + }) +} + +exports.rsort = rsort +function rsort (list, loose) { + return list.sort(function (a, b) { + return exports.compareBuild(b, a, loose) + }) +} + +exports.gt = gt +function gt (a, b, loose) { + return compare(a, b, loose) > 0 +} + +exports.lt = lt +function lt (a, b, loose) { + return compare(a, b, loose) < 0 +} + +exports.eq = eq +function eq (a, b, loose) { + return compare(a, b, loose) === 0 +} + +exports.neq = neq +function neq (a, b, loose) { + return compare(a, b, loose) !== 0 +} + +exports.gte = gte +function gte (a, b, loose) { + return compare(a, b, loose) >= 0 +} + +exports.lte = lte +function lte (a, b, loose) { + return compare(a, b, loose) <= 0 +} + +exports.cmp = cmp +function cmp (a, op, b, loose) { + switch (op) { + case '===': + if (typeof a === 'object') + a = a.version + if (typeof b === 'object') + b = b.version + return a === b + + case '!==': + if (typeof a === 'object') + a = a.version + if (typeof b === 'object') + b = b.version + return a !== b + + case '': + case '=': + case '==': + return eq(a, b, loose) + + case '!=': + return neq(a, b, loose) + + case '>': + return gt(a, b, loose) + + case '>=': + return gte(a, b, loose) + + case '<': + return lt(a, b, loose) + + case '<=': + return lte(a, b, loose) + + default: + throw new TypeError('Invalid operator: ' + op) + } +} + +exports.Comparator = Comparator +function Comparator (comp, options) { + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + + if (comp instanceof Comparator) { + if (comp.loose === !!options.loose) { + return comp + } else { + comp = comp.value + } + } + + if (!(this instanceof Comparator)) { + return new Comparator(comp, options) + } + + debug('comparator', comp, options) + this.options = options + this.loose = !!options.loose + this.parse(comp) + + if (this.semver === ANY) { + this.value = '' + } else { + this.value = this.operator + this.semver.version + } + + debug('comp', this) +} + +var ANY = {} +Comparator.prototype.parse = function (comp) { + var r = this.options.loose ? re[t.COMPARATORLOOSE] : re[t.COMPARATOR] + var m = comp.match(r) + + if (!m) { + throw new TypeError('Invalid comparator: ' + comp) + } + + this.operator = m[1] !== undefined ? m[1] : '' + if (this.operator === '=') { + this.operator = '' + } + + // if it literally is just '>' or '' then allow anything. + if (!m[2]) { + this.semver = ANY + } else { + this.semver = new SemVer(m[2], this.options.loose) + } +} + +Comparator.prototype.toString = function () { + return this.value +} + +Comparator.prototype.test = function (version) { + debug('Comparator.test', version, this.options.loose) + + if (this.semver === ANY || version === ANY) { + return true + } + + if (typeof version === 'string') { + try { + version = new SemVer(version, this.options) + } catch (er) { + return false + } + } + + return cmp(version, this.operator, this.semver, this.options) +} + +Comparator.prototype.intersects = function (comp, options) { + if (!(comp instanceof Comparator)) { + throw new TypeError('a Comparator is required') + } + + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + + var rangeTmp + + if (this.operator === '') { + if (this.value === '') { + return true + } + rangeTmp = new Range(comp.value, options) + return satisfies(this.value, rangeTmp, options) + } else if (comp.operator === '') { + if (comp.value === '') { + return true + } + rangeTmp = new Range(this.value, options) + return satisfies(comp.semver, rangeTmp, options) + } + + var sameDirectionIncreasing = + (this.operator === '>=' || this.operator === '>') && + (comp.operator === '>=' || comp.operator === '>') + var sameDirectionDecreasing = + (this.operator === '<=' || this.operator === '<') && + (comp.operator === '<=' || comp.operator === '<') + var sameSemVer = this.semver.version === comp.semver.version + var differentDirectionsInclusive = + (this.operator === '>=' || this.operator === '<=') && + (comp.operator === '>=' || comp.operator === '<=') + var oppositeDirectionsLessThan = + cmp(this.semver, '<', comp.semver, options) && + ((this.operator === '>=' || this.operator === '>') && + (comp.operator === '<=' || comp.operator === '<')) + var oppositeDirectionsGreaterThan = + cmp(this.semver, '>', comp.semver, options) && + ((this.operator === '<=' || this.operator === '<') && + (comp.operator === '>=' || comp.operator === '>')) + + return sameDirectionIncreasing || sameDirectionDecreasing || + (sameSemVer && differentDirectionsInclusive) || + oppositeDirectionsLessThan || oppositeDirectionsGreaterThan +} + +exports.Range = Range +function Range (range, options) { + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + + if (range instanceof Range) { + if (range.loose === !!options.loose && + range.includePrerelease === !!options.includePrerelease) { + return range + } else { + return new Range(range.raw, options) + } + } + + if (range instanceof Comparator) { + return new Range(range.value, options) + } + + if (!(this instanceof Range)) { + return new Range(range, options) + } + + this.options = options + this.loose = !!options.loose + this.includePrerelease = !!options.includePrerelease + + // First, split based on boolean or || + this.raw = range + this.set = range.split(/\s*\|\|\s*/).map(function (range) { + return this.parseRange(range.trim()) + }, this).filter(function (c) { + // throw out any that are not relevant for whatever reason + return c.length + }) + + if (!this.set.length) { + throw new TypeError('Invalid SemVer Range: ' + range) + } + + this.format() +} + +Range.prototype.format = function () { + this.range = this.set.map(function (comps) { + return comps.join(' ').trim() + }).join('||').trim() + return this.range +} + +Range.prototype.toString = function () { + return this.range +} + +Range.prototype.parseRange = function (range) { + var loose = this.options.loose + range = range.trim() + // `1.2.3 - 1.2.4` => `>=1.2.3 <=1.2.4` + var hr = loose ? re[t.HYPHENRANGELOOSE] : re[t.HYPHENRANGE] + range = range.replace(hr, hyphenReplace) + debug('hyphen replace', range) + // `> 1.2.3 < 1.2.5` => `>1.2.3 <1.2.5` + range = range.replace(re[t.COMPARATORTRIM], comparatorTrimReplace) + debug('comparator trim', range, re[t.COMPARATORTRIM]) + + // `~ 1.2.3` => `~1.2.3` + range = range.replace(re[t.TILDETRIM], tildeTrimReplace) + + // `^ 1.2.3` => `^1.2.3` + range = range.replace(re[t.CARETTRIM], caretTrimReplace) + + // normalize spaces + range = range.split(/\s+/).join(' ') + + // At this point, the range is completely trimmed and + // ready to be split into comparators. + + var compRe = loose ? re[t.COMPARATORLOOSE] : re[t.COMPARATOR] + var set = range.split(' ').map(function (comp) { + return parseComparator(comp, this.options) + }, this).join(' ').split(/\s+/) + if (this.options.loose) { + // in loose mode, throw out any that are not valid comparators + set = set.filter(function (comp) { + return !!comp.match(compRe) + }) + } + set = set.map(function (comp) { + return new Comparator(comp, this.options) + }, this) + + return set +} + +Range.prototype.intersects = function (range, options) { + if (!(range instanceof Range)) { + throw new TypeError('a Range is required') + } + + return this.set.some(function (thisComparators) { + return ( + isSatisfiable(thisComparators, options) && + range.set.some(function (rangeComparators) { + return ( + isSatisfiable(rangeComparators, options) && + thisComparators.every(function (thisComparator) { + return rangeComparators.every(function (rangeComparator) { + return thisComparator.intersects(rangeComparator, options) + }) + }) + ) + }) + ) + }) +} + +// take a set of comparators and determine whether there +// exists a version which can satisfy it +function isSatisfiable (comparators, options) { + var result = true + var remainingComparators = comparators.slice() + var testComparator = remainingComparators.pop() + + while (result && remainingComparators.length) { + result = remainingComparators.every(function (otherComparator) { + return testComparator.intersects(otherComparator, options) + }) + + testComparator = remainingComparators.pop() + } + + return result +} + +// Mostly just for testing and legacy API reasons +exports.toComparators = toComparators +function toComparators (range, options) { + return new Range(range, options).set.map(function (comp) { + return comp.map(function (c) { + return c.value + }).join(' ').trim().split(' ') + }) +} + +// comprised of xranges, tildes, stars, and gtlt's at this point. +// already replaced the hyphen ranges +// turn into a set of JUST comparators. +function parseComparator (comp, options) { + debug('comp', comp, options) + comp = replaceCarets(comp, options) + debug('caret', comp) + comp = replaceTildes(comp, options) + debug('tildes', comp) + comp = replaceXRanges(comp, options) + debug('xrange', comp) + comp = replaceStars(comp, options) + debug('stars', comp) + return comp +} + +function isX (id) { + return !id || id.toLowerCase() === 'x' || id === '*' +} + +// ~, ~> --> * (any, kinda silly) +// ~2, ~2.x, ~2.x.x, ~>2, ~>2.x ~>2.x.x --> >=2.0.0 <3.0.0 +// ~2.0, ~2.0.x, ~>2.0, ~>2.0.x --> >=2.0.0 <2.1.0 +// ~1.2, ~1.2.x, ~>1.2, ~>1.2.x --> >=1.2.0 <1.3.0 +// ~1.2.3, ~>1.2.3 --> >=1.2.3 <1.3.0 +// ~1.2.0, ~>1.2.0 --> >=1.2.0 <1.3.0 +function replaceTildes (comp, options) { + return comp.trim().split(/\s+/).map(function (comp) { + return replaceTilde(comp, options) + }).join(' ') +} + +function replaceTilde (comp, options) { + var r = options.loose ? re[t.TILDELOOSE] : re[t.TILDE] + return comp.replace(r, function (_, M, m, p, pr) { + debug('tilde', comp, _, M, m, p, pr) + var ret + + if (isX(M)) { + ret = '' + } else if (isX(m)) { + ret = '>=' + M + '.0.0 <' + (+M + 1) + '.0.0' + } else if (isX(p)) { + // ~1.2 == >=1.2.0 <1.3.0 + ret = '>=' + M + '.' + m + '.0 <' + M + '.' + (+m + 1) + '.0' + } else if (pr) { + debug('replaceTilde pr', pr) + ret = '>=' + M + '.' + m + '.' + p + '-' + pr + + ' <' + M + '.' + (+m + 1) + '.0' + } else { + // ~1.2.3 == >=1.2.3 <1.3.0 + ret = '>=' + M + '.' + m + '.' + p + + ' <' + M + '.' + (+m + 1) + '.0' + } + + debug('tilde return', ret) + return ret + }) +} + +// ^ --> * (any, kinda silly) +// ^2, ^2.x, ^2.x.x --> >=2.0.0 <3.0.0 +// ^2.0, ^2.0.x --> >=2.0.0 <3.0.0 +// ^1.2, ^1.2.x --> >=1.2.0 <2.0.0 +// ^1.2.3 --> >=1.2.3 <2.0.0 +// ^1.2.0 --> >=1.2.0 <2.0.0 +function replaceCarets (comp, options) { + return comp.trim().split(/\s+/).map(function (comp) { + return replaceCaret(comp, options) + }).join(' ') +} + +function replaceCaret (comp, options) { + debug('caret', comp, options) + var r = options.loose ? re[t.CARETLOOSE] : re[t.CARET] + return comp.replace(r, function (_, M, m, p, pr) { + debug('caret', comp, _, M, m, p, pr) + var ret + + if (isX(M)) { + ret = '' + } else if (isX(m)) { + ret = '>=' + M + '.0.0 <' + (+M + 1) + '.0.0' + } else if (isX(p)) { + if (M === '0') { + ret = '>=' + M + '.' + m + '.0 <' + M + '.' + (+m + 1) + '.0' + } else { + ret = '>=' + M + '.' + m + '.0 <' + (+M + 1) + '.0.0' + } + } else if (pr) { + debug('replaceCaret pr', pr) + if (M === '0') { + if (m === '0') { + ret = '>=' + M + '.' + m + '.' + p + '-' + pr + + ' <' + M + '.' + m + '.' + (+p + 1) + } else { + ret = '>=' + M + '.' + m + '.' + p + '-' + pr + + ' <' + M + '.' + (+m + 1) + '.0' + } + } else { + ret = '>=' + M + '.' + m + '.' + p + '-' + pr + + ' <' + (+M + 1) + '.0.0' + } + } else { + debug('no pr') + if (M === '0') { + if (m === '0') { + ret = '>=' + M + '.' + m + '.' + p + + ' <' + M + '.' + m + '.' + (+p + 1) + } else { + ret = '>=' + M + '.' + m + '.' + p + + ' <' + M + '.' + (+m + 1) + '.0' + } + } else { + ret = '>=' + M + '.' + m + '.' + p + + ' <' + (+M + 1) + '.0.0' + } + } + + debug('caret return', ret) + return ret + }) +} + +function replaceXRanges (comp, options) { + debug('replaceXRanges', comp, options) + return comp.split(/\s+/).map(function (comp) { + return replaceXRange(comp, options) + }).join(' ') +} + +function replaceXRange (comp, options) { + comp = comp.trim() + var r = options.loose ? re[t.XRANGELOOSE] : re[t.XRANGE] + return comp.replace(r, function (ret, gtlt, M, m, p, pr) { + debug('xRange', comp, ret, gtlt, M, m, p, pr) + var xM = isX(M) + var xm = xM || isX(m) + var xp = xm || isX(p) + var anyX = xp + + if (gtlt === '=' && anyX) { + gtlt = '' + } + + // if we're including prereleases in the match, then we need + // to fix this to -0, the lowest possible prerelease value + pr = options.includePrerelease ? '-0' : '' + + if (xM) { + if (gtlt === '>' || gtlt === '<') { + // nothing is allowed + ret = '<0.0.0-0' + } else { + // nothing is forbidden + ret = '*' + } + } else if (gtlt && anyX) { + // we know patch is an x, because we have any x at all. + // replace X with 0 + if (xm) { + m = 0 + } + p = 0 + + if (gtlt === '>') { + // >1 => >=2.0.0 + // >1.2 => >=1.3.0 + // >1.2.3 => >= 1.2.4 + gtlt = '>=' + if (xm) { + M = +M + 1 + m = 0 + p = 0 + } else { + m = +m + 1 + p = 0 + } + } else if (gtlt === '<=') { + // <=0.7.x is actually <0.8.0, since any 0.7.x should + // pass. Similarly, <=7.x is actually <8.0.0, etc. + gtlt = '<' + if (xm) { + M = +M + 1 + } else { + m = +m + 1 + } + } + + ret = gtlt + M + '.' + m + '.' + p + pr + } else if (xm) { + ret = '>=' + M + '.0.0' + pr + ' <' + (+M + 1) + '.0.0' + pr + } else if (xp) { + ret = '>=' + M + '.' + m + '.0' + pr + + ' <' + M + '.' + (+m + 1) + '.0' + pr + } + + debug('xRange return', ret) + + return ret + }) +} + +// Because * is AND-ed with everything else in the comparator, +// and '' means "any version", just remove the *s entirely. +function replaceStars (comp, options) { + debug('replaceStars', comp, options) + // Looseness is ignored here. star is always as loose as it gets! + return comp.trim().replace(re[t.STAR], '') +} + +// This function is passed to string.replace(re[t.HYPHENRANGE]) +// M, m, patch, prerelease, build +// 1.2 - 3.4.5 => >=1.2.0 <=3.4.5 +// 1.2.3 - 3.4 => >=1.2.0 <3.5.0 Any 3.4.x will do +// 1.2 - 3.4 => >=1.2.0 <3.5.0 +function hyphenReplace ($0, + from, fM, fm, fp, fpr, fb, + to, tM, tm, tp, tpr, tb) { + if (isX(fM)) { + from = '' + } else if (isX(fm)) { + from = '>=' + fM + '.0.0' + } else if (isX(fp)) { + from = '>=' + fM + '.' + fm + '.0' + } else { + from = '>=' + from + } + + if (isX(tM)) { + to = '' + } else if (isX(tm)) { + to = '<' + (+tM + 1) + '.0.0' + } else if (isX(tp)) { + to = '<' + tM + '.' + (+tm + 1) + '.0' + } else if (tpr) { + to = '<=' + tM + '.' + tm + '.' + tp + '-' + tpr + } else { + to = '<=' + to + } + + return (from + ' ' + to).trim() +} + +// if ANY of the sets match ALL of its comparators, then pass +Range.prototype.test = function (version) { + if (!version) { + return false + } + + if (typeof version === 'string') { + try { + version = new SemVer(version, this.options) + } catch (er) { + return false + } + } + + for (var i = 0; i < this.set.length; i++) { + if (testSet(this.set[i], version, this.options)) { + return true + } + } + return false +} + +function testSet (set, version, options) { + for (var i = 0; i < set.length; i++) { + if (!set[i].test(version)) { + return false + } + } + + if (version.prerelease.length && !options.includePrerelease) { + // Find the set of versions that are allowed to have prereleases + // For example, ^1.2.3-pr.1 desugars to >=1.2.3-pr.1 <2.0.0 + // That should allow `1.2.3-pr.2` to pass. + // However, `1.2.4-alpha.notready` should NOT be allowed, + // even though it's within the range set by the comparators. + for (i = 0; i < set.length; i++) { + debug(set[i].semver) + if (set[i].semver === ANY) { + continue + } + + if (set[i].semver.prerelease.length > 0) { + var allowed = set[i].semver + if (allowed.major === version.major && + allowed.minor === version.minor && + allowed.patch === version.patch) { + return true + } + } + } + + // Version has a -pre, but it's not one of the ones we like. + return false + } + + return true +} + +exports.satisfies = satisfies +function satisfies (version, range, options) { + try { + range = new Range(range, options) + } catch (er) { + return false + } + return range.test(version) +} + +exports.maxSatisfying = maxSatisfying +function maxSatisfying (versions, range, options) { + var max = null + var maxSV = null + try { + var rangeObj = new Range(range, options) + } catch (er) { + return null + } + versions.forEach(function (v) { + if (rangeObj.test(v)) { + // satisfies(v, range, options) + if (!max || maxSV.compare(v) === -1) { + // compare(max, v, true) + max = v + maxSV = new SemVer(max, options) + } + } + }) + return max +} + +exports.minSatisfying = minSatisfying +function minSatisfying (versions, range, options) { + var min = null + var minSV = null + try { + var rangeObj = new Range(range, options) + } catch (er) { + return null + } + versions.forEach(function (v) { + if (rangeObj.test(v)) { + // satisfies(v, range, options) + if (!min || minSV.compare(v) === 1) { + // compare(min, v, true) + min = v + minSV = new SemVer(min, options) + } + } + }) + return min +} + +exports.minVersion = minVersion +function minVersion (range, loose) { + range = new Range(range, loose) + + var minver = new SemVer('0.0.0') + if (range.test(minver)) { + return minver + } + + minver = new SemVer('0.0.0-0') + if (range.test(minver)) { + return minver + } + + minver = null + for (var i = 0; i < range.set.length; ++i) { + var comparators = range.set[i] + + comparators.forEach(function (comparator) { + // Clone to avoid manipulating the comparator's semver object. + var compver = new SemVer(comparator.semver.version) + switch (comparator.operator) { + case '>': + if (compver.prerelease.length === 0) { + compver.patch++ + } else { + compver.prerelease.push(0) + } + compver.raw = compver.format() + /* fallthrough */ + case '': + case '>=': + if (!minver || gt(minver, compver)) { + minver = compver + } + break + case '<': + case '<=': + /* Ignore maximum versions */ + break + /* istanbul ignore next */ + default: + throw new Error('Unexpected operation: ' + comparator.operator) + } + }) + } + + if (minver && range.test(minver)) { + return minver + } + + return null +} + +exports.validRange = validRange +function validRange (range, options) { + try { + // Return '*' instead of '' so that truthiness works. + // This will throw if it's invalid anyway + return new Range(range, options).range || '*' + } catch (er) { + return null + } +} + +// Determine if version is less than all the versions possible in the range +exports.ltr = ltr +function ltr (version, range, options) { + return outside(version, range, '<', options) +} + +// Determine if version is greater than all the versions possible in the range. +exports.gtr = gtr +function gtr (version, range, options) { + return outside(version, range, '>', options) +} + +exports.outside = outside +function outside (version, range, hilo, options) { + version = new SemVer(version, options) + range = new Range(range, options) + + var gtfn, ltefn, ltfn, comp, ecomp + switch (hilo) { + case '>': + gtfn = gt + ltefn = lte + ltfn = lt + comp = '>' + ecomp = '>=' + break + case '<': + gtfn = lt + ltefn = gte + ltfn = gt + comp = '<' + ecomp = '<=' + break + default: + throw new TypeError('Must provide a hilo val of "<" or ">"') + } + + // If it satisifes the range it is not outside + if (satisfies(version, range, options)) { + return false + } + + // From now on, variable terms are as if we're in "gtr" mode. + // but note that everything is flipped for the "ltr" function. + + for (var i = 0; i < range.set.length; ++i) { + var comparators = range.set[i] + + var high = null + var low = null + + comparators.forEach(function (comparator) { + if (comparator.semver === ANY) { + comparator = new Comparator('>=0.0.0') + } + high = high || comparator + low = low || comparator + if (gtfn(comparator.semver, high.semver, options)) { + high = comparator + } else if (ltfn(comparator.semver, low.semver, options)) { + low = comparator + } + }) + + // If the edge version comparator has a operator then our version + // isn't outside it + if (high.operator === comp || high.operator === ecomp) { + return false + } + + // If the lowest version comparator has an operator and our version + // is less than it then it isn't higher than the range + if ((!low.operator || low.operator === comp) && + ltefn(version, low.semver)) { + return false + } else if (low.operator === ecomp && ltfn(version, low.semver)) { + return false + } + } + return true +} + +exports.prerelease = prerelease +function prerelease (version, options) { + var parsed = parse(version, options) + return (parsed && parsed.prerelease.length) ? parsed.prerelease : null +} + +exports.intersects = intersects +function intersects (r1, r2, options) { + r1 = new Range(r1, options) + r2 = new Range(r2, options) + return r1.intersects(r2) +} + +exports.coerce = coerce +function coerce (version, options) { + if (version instanceof SemVer) { + return version + } + + if (typeof version === 'number') { + version = String(version) + } + + if (typeof version !== 'string') { + return null + } + + options = options || {} + + var match = null + if (!options.rtl) { + match = version.match(re[t.COERCE]) + } else { + // Find the right-most coercible string that does not share + // a terminus with a more left-ward coercible string. + // Eg, '1.2.3.4' wants to coerce '2.3.4', not '3.4' or '4' + // + // Walk through the string checking with a /g regexp + // Manually set the index so as to pick up overlapping matches. + // Stop when we get a match that ends at the string end, since no + // coercible string can be more right-ward without the same terminus. + var next + while ((next = re[t.COERCERTL].exec(version)) && + (!match || match.index + match[0].length !== version.length) + ) { + if (!match || + next.index + next[0].length !== match.index + match[0].length) { + match = next + } + re[t.COERCERTL].lastIndex = next.index + next[1].length + next[2].length + } + // leave it in a clean state + re[t.COERCERTL].lastIndex = -1 + } + + if (match === null) { + return null + } + + return parse(match[2] + + '.' + (match[3] || '0') + + '.' + (match[4] || '0'), options) +} + + +/***/ }), + +/***/ 623: +/***/ (function(module, __unused_webpack_exports, __nccwpck_require__) { + +/* module decorator */ module = __nccwpck_require__.nmd(module); +//! moment.js +//! version : 2.29.1 +//! authors : Tim Wood, Iskren Chernev, Moment.js contributors +//! license : MIT +//! momentjs.com + +;(function (global, factory) { + true ? module.exports = factory() : + 0 +}(this, (function () { 'use strict'; + + var hookCallback; + + function hooks() { + return hookCallback.apply(null, arguments); + } + + // This is done to register the method called with moment() + // without creating circular dependencies. + function setHookCallback(callback) { + hookCallback = callback; + } + + function isArray(input) { + return ( + input instanceof Array || + Object.prototype.toString.call(input) === '[object Array]' + ); + } + + function isObject(input) { + // IE8 will treat undefined and null as object if it wasn't for + // input != null + return ( + input != null && + Object.prototype.toString.call(input) === '[object Object]' + ); + } + + function hasOwnProp(a, b) { + return Object.prototype.hasOwnProperty.call(a, b); + } + + function isObjectEmpty(obj) { + if (Object.getOwnPropertyNames) { + return Object.getOwnPropertyNames(obj).length === 0; + } else { + var k; + for (k in obj) { + if (hasOwnProp(obj, k)) { + return false; + } + } + return true; + } + } + + function isUndefined(input) { + return input === void 0; + } + + function isNumber(input) { + return ( + typeof input === 'number' || + Object.prototype.toString.call(input) === '[object Number]' + ); + } + + function isDate(input) { + return ( + input instanceof Date || + Object.prototype.toString.call(input) === '[object Date]' + ); + } + + function map(arr, fn) { + var res = [], + i; + for (i = 0; i < arr.length; ++i) { + res.push(fn(arr[i], i)); + } + return res; + } + + function extend(a, b) { + for (var i in b) { + if (hasOwnProp(b, i)) { + a[i] = b[i]; + } + } + + if (hasOwnProp(b, 'toString')) { + a.toString = b.toString; + } + + if (hasOwnProp(b, 'valueOf')) { + a.valueOf = b.valueOf; + } + + return a; + } + + function createUTC(input, format, locale, strict) { + return createLocalOrUTC(input, format, locale, strict, true).utc(); + } + + function defaultParsingFlags() { + // We need to deep clone this object. + return { + empty: false, + unusedTokens: [], + unusedInput: [], + overflow: -2, + charsLeftOver: 0, + nullInput: false, + invalidEra: null, + invalidMonth: null, + invalidFormat: false, + userInvalidated: false, + iso: false, + parsedDateParts: [], + era: null, + meridiem: null, + rfc2822: false, + weekdayMismatch: false, + }; + } + + function getParsingFlags(m) { + if (m._pf == null) { + m._pf = defaultParsingFlags(); + } + return m._pf; + } + + var some; + if (Array.prototype.some) { + some = Array.prototype.some; + } else { + some = function (fun) { + var t = Object(this), + len = t.length >>> 0, + i; + + for (i = 0; i < len; i++) { + if (i in t && fun.call(this, t[i], i, t)) { + return true; + } + } + + return false; + }; + } + + function isValid(m) { + if (m._isValid == null) { + var flags = getParsingFlags(m), + parsedParts = some.call(flags.parsedDateParts, function (i) { + return i != null; + }), + isNowValid = + !isNaN(m._d.getTime()) && + flags.overflow < 0 && + !flags.empty && + !flags.invalidEra && + !flags.invalidMonth && + !flags.invalidWeekday && + !flags.weekdayMismatch && + !flags.nullInput && + !flags.invalidFormat && + !flags.userInvalidated && + (!flags.meridiem || (flags.meridiem && parsedParts)); + + if (m._strict) { + isNowValid = + isNowValid && + flags.charsLeftOver === 0 && + flags.unusedTokens.length === 0 && + flags.bigHour === undefined; + } + + if (Object.isFrozen == null || !Object.isFrozen(m)) { + m._isValid = isNowValid; + } else { + return isNowValid; + } + } + return m._isValid; + } + + function createInvalid(flags) { + var m = createUTC(NaN); + if (flags != null) { + extend(getParsingFlags(m), flags); + } else { + getParsingFlags(m).userInvalidated = true; + } + + return m; + } + + // Plugins that add properties should also add the key here (null value), + // so we can properly clone ourselves. + var momentProperties = (hooks.momentProperties = []), + updateInProgress = false; + + function copyConfig(to, from) { + var i, prop, val; + + if (!isUndefined(from._isAMomentObject)) { + to._isAMomentObject = from._isAMomentObject; + } + if (!isUndefined(from._i)) { + to._i = from._i; + } + if (!isUndefined(from._f)) { + to._f = from._f; + } + if (!isUndefined(from._l)) { + to._l = from._l; + } + if (!isUndefined(from._strict)) { + to._strict = from._strict; + } + if (!isUndefined(from._tzm)) { + to._tzm = from._tzm; + } + if (!isUndefined(from._isUTC)) { + to._isUTC = from._isUTC; + } + if (!isUndefined(from._offset)) { + to._offset = from._offset; + } + if (!isUndefined(from._pf)) { + to._pf = getParsingFlags(from); + } + if (!isUndefined(from._locale)) { + to._locale = from._locale; + } + + if (momentProperties.length > 0) { + for (i = 0; i < momentProperties.length; i++) { + prop = momentProperties[i]; + val = from[prop]; + if (!isUndefined(val)) { + to[prop] = val; + } + } + } + + return to; + } + + // Moment prototype object + function Moment(config) { + copyConfig(this, config); + this._d = new Date(config._d != null ? config._d.getTime() : NaN); + if (!this.isValid()) { + this._d = new Date(NaN); + } + // Prevent infinite loop in case updateOffset creates new moment + // objects. + if (updateInProgress === false) { + updateInProgress = true; + hooks.updateOffset(this); + updateInProgress = false; + } + } + + function isMoment(obj) { + return ( + obj instanceof Moment || (obj != null && obj._isAMomentObject != null) + ); + } + + function warn(msg) { + if ( + hooks.suppressDeprecationWarnings === false && + typeof console !== 'undefined' && + console.warn + ) { + console.warn('Deprecation warning: ' + msg); + } + } + + function deprecate(msg, fn) { + var firstTime = true; + + return extend(function () { + if (hooks.deprecationHandler != null) { + hooks.deprecationHandler(null, msg); + } + if (firstTime) { + var args = [], + arg, + i, + key; + for (i = 0; i < arguments.length; i++) { + arg = ''; + if (typeof arguments[i] === 'object') { + arg += '\n[' + i + '] '; + for (key in arguments[0]) { + if (hasOwnProp(arguments[0], key)) { + arg += key + ': ' + arguments[0][key] + ', '; + } + } + arg = arg.slice(0, -2); // Remove trailing comma and space + } else { + arg = arguments[i]; + } + args.push(arg); + } + warn( + msg + + '\nArguments: ' + + Array.prototype.slice.call(args).join('') + + '\n' + + new Error().stack + ); + firstTime = false; + } + return fn.apply(this, arguments); + }, fn); + } + + var deprecations = {}; + + function deprecateSimple(name, msg) { + if (hooks.deprecationHandler != null) { + hooks.deprecationHandler(name, msg); + } + if (!deprecations[name]) { + warn(msg); + deprecations[name] = true; + } + } + + hooks.suppressDeprecationWarnings = false; + hooks.deprecationHandler = null; + + function isFunction(input) { + return ( + (typeof Function !== 'undefined' && input instanceof Function) || + Object.prototype.toString.call(input) === '[object Function]' + ); + } + + function set(config) { + var prop, i; + for (i in config) { + if (hasOwnProp(config, i)) { + prop = config[i]; + if (isFunction(prop)) { + this[i] = prop; + } else { + this['_' + i] = prop; + } + } + } + this._config = config; + // Lenient ordinal parsing accepts just a number in addition to + // number + (possibly) stuff coming from _dayOfMonthOrdinalParse. + // TODO: Remove "ordinalParse" fallback in next major release. + this._dayOfMonthOrdinalParseLenient = new RegExp( + (this._dayOfMonthOrdinalParse.source || this._ordinalParse.source) + + '|' + + /\d{1,2}/.source + ); + } + + function mergeConfigs(parentConfig, childConfig) { + var res = extend({}, parentConfig), + prop; + for (prop in childConfig) { + if (hasOwnProp(childConfig, prop)) { + if (isObject(parentConfig[prop]) && isObject(childConfig[prop])) { + res[prop] = {}; + extend(res[prop], parentConfig[prop]); + extend(res[prop], childConfig[prop]); + } else if (childConfig[prop] != null) { + res[prop] = childConfig[prop]; + } else { + delete res[prop]; + } + } + } + for (prop in parentConfig) { + if ( + hasOwnProp(parentConfig, prop) && + !hasOwnProp(childConfig, prop) && + isObject(parentConfig[prop]) + ) { + // make sure changes to properties don't modify parent config + res[prop] = extend({}, res[prop]); + } + } + return res; + } + + function Locale(config) { + if (config != null) { + this.set(config); + } + } + + var keys; + + if (Object.keys) { + keys = Object.keys; + } else { + keys = function (obj) { + var i, + res = []; + for (i in obj) { + if (hasOwnProp(obj, i)) { + res.push(i); + } + } + return res; + }; + } + + var defaultCalendar = { + sameDay: '[Today at] LT', + nextDay: '[Tomorrow at] LT', + nextWeek: 'dddd [at] LT', + lastDay: '[Yesterday at] LT', + lastWeek: '[Last] dddd [at] LT', + sameElse: 'L', + }; + + function calendar(key, mom, now) { + var output = this._calendar[key] || this._calendar['sameElse']; + return isFunction(output) ? output.call(mom, now) : output; + } + + function zeroFill(number, targetLength, forceSign) { + var absNumber = '' + Math.abs(number), + zerosToFill = targetLength - absNumber.length, + sign = number >= 0; + return ( + (sign ? (forceSign ? '+' : '') : '-') + + Math.pow(10, Math.max(0, zerosToFill)).toString().substr(1) + + absNumber + ); + } + + var formattingTokens = /(\[[^\[]*\])|(\\)?([Hh]mm(ss)?|Mo|MM?M?M?|Do|DDDo|DD?D?D?|ddd?d?|do?|w[o|w]?|W[o|W]?|Qo?|N{1,5}|YYYYYY|YYYYY|YYYY|YY|y{2,4}|yo?|gg(ggg?)?|GG(GGG?)?|e|E|a|A|hh?|HH?|kk?|mm?|ss?|S{1,9}|x|X|zz?|ZZ?|.)/g, + localFormattingTokens = /(\[[^\[]*\])|(\\)?(LTS|LT|LL?L?L?|l{1,4})/g, + formatFunctions = {}, + formatTokenFunctions = {}; + + // token: 'M' + // padded: ['MM', 2] + // ordinal: 'Mo' + // callback: function () { this.month() + 1 } + function addFormatToken(token, padded, ordinal, callback) { + var func = callback; + if (typeof callback === 'string') { + func = function () { + return this[callback](); + }; + } + if (token) { + formatTokenFunctions[token] = func; + } + if (padded) { + formatTokenFunctions[padded[0]] = function () { + return zeroFill(func.apply(this, arguments), padded[1], padded[2]); + }; + } + if (ordinal) { + formatTokenFunctions[ordinal] = function () { + return this.localeData().ordinal( + func.apply(this, arguments), + token + ); + }; + } + } + + function removeFormattingTokens(input) { + if (input.match(/\[[\s\S]/)) { + return input.replace(/^\[|\]$/g, ''); + } + return input.replace(/\\/g, ''); + } + + function makeFormatFunction(format) { + var array = format.match(formattingTokens), + i, + length; + + for (i = 0, length = array.length; i < length; i++) { + if (formatTokenFunctions[array[i]]) { + array[i] = formatTokenFunctions[array[i]]; + } else { + array[i] = removeFormattingTokens(array[i]); + } + } + + return function (mom) { + var output = '', + i; + for (i = 0; i < length; i++) { + output += isFunction(array[i]) + ? array[i].call(mom, format) + : array[i]; + } + return output; + }; + } + + // format date using native date object + function formatMoment(m, format) { + if (!m.isValid()) { + return m.localeData().invalidDate(); + } + + format = expandFormat(format, m.localeData()); + formatFunctions[format] = + formatFunctions[format] || makeFormatFunction(format); + + return formatFunctions[format](m); + } + + function expandFormat(format, locale) { + var i = 5; + + function replaceLongDateFormatTokens(input) { + return locale.longDateFormat(input) || input; + } + + localFormattingTokens.lastIndex = 0; + while (i >= 0 && localFormattingTokens.test(format)) { + format = format.replace( + localFormattingTokens, + replaceLongDateFormatTokens + ); + localFormattingTokens.lastIndex = 0; + i -= 1; + } + + return format; + } + + var defaultLongDateFormat = { + LTS: 'h:mm:ss A', + LT: 'h:mm A', + L: 'MM/DD/YYYY', + LL: 'MMMM D, YYYY', + LLL: 'MMMM D, YYYY h:mm A', + LLLL: 'dddd, MMMM D, YYYY h:mm A', + }; + + function longDateFormat(key) { + var format = this._longDateFormat[key], + formatUpper = this._longDateFormat[key.toUpperCase()]; + + if (format || !formatUpper) { + return format; + } + + this._longDateFormat[key] = formatUpper + .match(formattingTokens) + .map(function (tok) { + if ( + tok === 'MMMM' || + tok === 'MM' || + tok === 'DD' || + tok === 'dddd' + ) { + return tok.slice(1); + } + return tok; + }) + .join(''); + + return this._longDateFormat[key]; + } + + var defaultInvalidDate = 'Invalid date'; + + function invalidDate() { + return this._invalidDate; + } + + var defaultOrdinal = '%d', + defaultDayOfMonthOrdinalParse = /\d{1,2}/; + + function ordinal(number) { + return this._ordinal.replace('%d', number); + } + + var defaultRelativeTime = { + future: 'in %s', + past: '%s ago', + s: 'a few seconds', + ss: '%d seconds', + m: 'a minute', + mm: '%d minutes', + h: 'an hour', + hh: '%d hours', + d: 'a day', + dd: '%d days', + w: 'a week', + ww: '%d weeks', + M: 'a month', + MM: '%d months', + y: 'a year', + yy: '%d years', + }; + + function relativeTime(number, withoutSuffix, string, isFuture) { + var output = this._relativeTime[string]; + return isFunction(output) + ? output(number, withoutSuffix, string, isFuture) + : output.replace(/%d/i, number); + } + + function pastFuture(diff, output) { + var format = this._relativeTime[diff > 0 ? 'future' : 'past']; + return isFunction(format) ? format(output) : format.replace(/%s/i, output); + } + + var aliases = {}; + + function addUnitAlias(unit, shorthand) { + var lowerCase = unit.toLowerCase(); + aliases[lowerCase] = aliases[lowerCase + 's'] = aliases[shorthand] = unit; + } + + function normalizeUnits(units) { + return typeof units === 'string' + ? aliases[units] || aliases[units.toLowerCase()] + : undefined; + } + + function normalizeObjectUnits(inputObject) { + var normalizedInput = {}, + normalizedProp, + prop; + + for (prop in inputObject) { + if (hasOwnProp(inputObject, prop)) { + normalizedProp = normalizeUnits(prop); + if (normalizedProp) { + normalizedInput[normalizedProp] = inputObject[prop]; + } + } + } + + return normalizedInput; + } + + var priorities = {}; + + function addUnitPriority(unit, priority) { + priorities[unit] = priority; + } + + function getPrioritizedUnits(unitsObj) { + var units = [], + u; + for (u in unitsObj) { + if (hasOwnProp(unitsObj, u)) { + units.push({ unit: u, priority: priorities[u] }); + } + } + units.sort(function (a, b) { + return a.priority - b.priority; + }); + return units; + } + + function isLeapYear(year) { + return (year % 4 === 0 && year % 100 !== 0) || year % 400 === 0; + } + + function absFloor(number) { + if (number < 0) { + // -0 -> 0 + return Math.ceil(number) || 0; + } else { + return Math.floor(number); + } + } + + function toInt(argumentForCoercion) { + var coercedNumber = +argumentForCoercion, + value = 0; + + if (coercedNumber !== 0 && isFinite(coercedNumber)) { + value = absFloor(coercedNumber); + } + + return value; + } + + function makeGetSet(unit, keepTime) { + return function (value) { + if (value != null) { + set$1(this, unit, value); + hooks.updateOffset(this, keepTime); + return this; + } else { + return get(this, unit); + } + }; + } + + function get(mom, unit) { + return mom.isValid() + ? mom._d['get' + (mom._isUTC ? 'UTC' : '') + unit]() + : NaN; + } + + function set$1(mom, unit, value) { + if (mom.isValid() && !isNaN(value)) { + if ( + unit === 'FullYear' && + isLeapYear(mom.year()) && + mom.month() === 1 && + mom.date() === 29 + ) { + value = toInt(value); + mom._d['set' + (mom._isUTC ? 'UTC' : '') + unit]( + value, + mom.month(), + daysInMonth(value, mom.month()) + ); + } else { + mom._d['set' + (mom._isUTC ? 'UTC' : '') + unit](value); + } + } + } + + // MOMENTS + + function stringGet(units) { + units = normalizeUnits(units); + if (isFunction(this[units])) { + return this[units](); + } + return this; + } + + function stringSet(units, value) { + if (typeof units === 'object') { + units = normalizeObjectUnits(units); + var prioritized = getPrioritizedUnits(units), + i; + for (i = 0; i < prioritized.length; i++) { + this[prioritized[i].unit](units[prioritized[i].unit]); + } + } else { + units = normalizeUnits(units); + if (isFunction(this[units])) { + return this[units](value); + } + } + return this; + } + + var match1 = /\d/, // 0 - 9 + match2 = /\d\d/, // 00 - 99 + match3 = /\d{3}/, // 000 - 999 + match4 = /\d{4}/, // 0000 - 9999 + match6 = /[+-]?\d{6}/, // -999999 - 999999 + match1to2 = /\d\d?/, // 0 - 99 + match3to4 = /\d\d\d\d?/, // 999 - 9999 + match5to6 = /\d\d\d\d\d\d?/, // 99999 - 999999 + match1to3 = /\d{1,3}/, // 0 - 999 + match1to4 = /\d{1,4}/, // 0 - 9999 + match1to6 = /[+-]?\d{1,6}/, // -999999 - 999999 + matchUnsigned = /\d+/, // 0 - inf + matchSigned = /[+-]?\d+/, // -inf - inf + matchOffset = /Z|[+-]\d\d:?\d\d/gi, // +00:00 -00:00 +0000 -0000 or Z + matchShortOffset = /Z|[+-]\d\d(?::?\d\d)?/gi, // +00 -00 +00:00 -00:00 +0000 -0000 or Z + matchTimestamp = /[+-]?\d+(\.\d{1,3})?/, // 123456789 123456789.123 + // any word (or two) characters or numbers including two/three word month in arabic. + // includes scottish gaelic two word and hyphenated months + matchWord = /[0-9]{0,256}['a-z\u00A0-\u05FF\u0700-\uD7FF\uF900-\uFDCF\uFDF0-\uFF07\uFF10-\uFFEF]{1,256}|[\u0600-\u06FF\/]{1,256}(\s*?[\u0600-\u06FF]{1,256}){1,2}/i, + regexes; + + regexes = {}; + + function addRegexToken(token, regex, strictRegex) { + regexes[token] = isFunction(regex) + ? regex + : function (isStrict, localeData) { + return isStrict && strictRegex ? strictRegex : regex; + }; + } + + function getParseRegexForToken(token, config) { + if (!hasOwnProp(regexes, token)) { + return new RegExp(unescapeFormat(token)); + } + + return regexes[token](config._strict, config._locale); + } + + // Code from http://stackoverflow.com/questions/3561493/is-there-a-regexp-escape-function-in-javascript + function unescapeFormat(s) { + return regexEscape( + s + .replace('\\', '') + .replace(/\\(\[)|\\(\])|\[([^\]\[]*)\]|\\(.)/g, function ( + matched, + p1, + p2, + p3, + p4 + ) { + return p1 || p2 || p3 || p4; + }) + ); + } + + function regexEscape(s) { + return s.replace(/[-\/\\^$*+?.()|[\]{}]/g, '\\$&'); + } + + var tokens = {}; + + function addParseToken(token, callback) { + var i, + func = callback; + if (typeof token === 'string') { + token = [token]; + } + if (isNumber(callback)) { + func = function (input, array) { + array[callback] = toInt(input); + }; + } + for (i = 0; i < token.length; i++) { + tokens[token[i]] = func; + } + } + + function addWeekParseToken(token, callback) { + addParseToken(token, function (input, array, config, token) { + config._w = config._w || {}; + callback(input, config._w, config, token); + }); + } + + function addTimeToArrayFromToken(token, input, config) { + if (input != null && hasOwnProp(tokens, token)) { + tokens[token](input, config._a, config, token); + } + } + + var YEAR = 0, + MONTH = 1, + DATE = 2, + HOUR = 3, + MINUTE = 4, + SECOND = 5, + MILLISECOND = 6, + WEEK = 7, + WEEKDAY = 8; + + function mod(n, x) { + return ((n % x) + x) % x; + } + + var indexOf; + + if (Array.prototype.indexOf) { + indexOf = Array.prototype.indexOf; + } else { + indexOf = function (o) { + // I know + var i; + for (i = 0; i < this.length; ++i) { + if (this[i] === o) { + return i; + } + } + return -1; + }; + } + + function daysInMonth(year, month) { + if (isNaN(year) || isNaN(month)) { + return NaN; + } + var modMonth = mod(month, 12); + year += (month - modMonth) / 12; + return modMonth === 1 + ? isLeapYear(year) + ? 29 + : 28 + : 31 - ((modMonth % 7) % 2); + } + + // FORMATTING + + addFormatToken('M', ['MM', 2], 'Mo', function () { + return this.month() + 1; + }); + + addFormatToken('MMM', 0, 0, function (format) { + return this.localeData().monthsShort(this, format); + }); + + addFormatToken('MMMM', 0, 0, function (format) { + return this.localeData().months(this, format); + }); + + // ALIASES + + addUnitAlias('month', 'M'); + + // PRIORITY + + addUnitPriority('month', 8); + + // PARSING + + addRegexToken('M', match1to2); + addRegexToken('MM', match1to2, match2); + addRegexToken('MMM', function (isStrict, locale) { + return locale.monthsShortRegex(isStrict); + }); + addRegexToken('MMMM', function (isStrict, locale) { + return locale.monthsRegex(isStrict); + }); + + addParseToken(['M', 'MM'], function (input, array) { + array[MONTH] = toInt(input) - 1; + }); + + addParseToken(['MMM', 'MMMM'], function (input, array, config, token) { + var month = config._locale.monthsParse(input, token, config._strict); + // if we didn't find a month name, mark the date as invalid. + if (month != null) { + array[MONTH] = month; + } else { + getParsingFlags(config).invalidMonth = input; + } + }); + + // LOCALES + + var defaultLocaleMonths = 'January_February_March_April_May_June_July_August_September_October_November_December'.split( + '_' + ), + defaultLocaleMonthsShort = 'Jan_Feb_Mar_Apr_May_Jun_Jul_Aug_Sep_Oct_Nov_Dec'.split( + '_' + ), + MONTHS_IN_FORMAT = /D[oD]?(\[[^\[\]]*\]|\s)+MMMM?/, + defaultMonthsShortRegex = matchWord, + defaultMonthsRegex = matchWord; + + function localeMonths(m, format) { + if (!m) { + return isArray(this._months) + ? this._months + : this._months['standalone']; + } + return isArray(this._months) + ? this._months[m.month()] + : this._months[ + (this._months.isFormat || MONTHS_IN_FORMAT).test(format) + ? 'format' + : 'standalone' + ][m.month()]; + } + + function localeMonthsShort(m, format) { + if (!m) { + return isArray(this._monthsShort) + ? this._monthsShort + : this._monthsShort['standalone']; + } + return isArray(this._monthsShort) + ? this._monthsShort[m.month()] + : this._monthsShort[ + MONTHS_IN_FORMAT.test(format) ? 'format' : 'standalone' + ][m.month()]; + } + + function handleStrictParse(monthName, format, strict) { + var i, + ii, + mom, + llc = monthName.toLocaleLowerCase(); + if (!this._monthsParse) { + // this is not used + this._monthsParse = []; + this._longMonthsParse = []; + this._shortMonthsParse = []; + for (i = 0; i < 12; ++i) { + mom = createUTC([2000, i]); + this._shortMonthsParse[i] = this.monthsShort( + mom, + '' + ).toLocaleLowerCase(); + this._longMonthsParse[i] = this.months(mom, '').toLocaleLowerCase(); + } + } + + if (strict) { + if (format === 'MMM') { + ii = indexOf.call(this._shortMonthsParse, llc); + return ii !== -1 ? ii : null; + } else { + ii = indexOf.call(this._longMonthsParse, llc); + return ii !== -1 ? ii : null; + } + } else { + if (format === 'MMM') { + ii = indexOf.call(this._shortMonthsParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._longMonthsParse, llc); + return ii !== -1 ? ii : null; + } else { + ii = indexOf.call(this._longMonthsParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._shortMonthsParse, llc); + return ii !== -1 ? ii : null; + } + } + } + + function localeMonthsParse(monthName, format, strict) { + var i, mom, regex; + + if (this._monthsParseExact) { + return handleStrictParse.call(this, monthName, format, strict); + } + + if (!this._monthsParse) { + this._monthsParse = []; + this._longMonthsParse = []; + this._shortMonthsParse = []; + } + + // TODO: add sorting + // Sorting makes sure if one month (or abbr) is a prefix of another + // see sorting in computeMonthsParse + for (i = 0; i < 12; i++) { + // make the regex if we don't have it already + mom = createUTC([2000, i]); + if (strict && !this._longMonthsParse[i]) { + this._longMonthsParse[i] = new RegExp( + '^' + this.months(mom, '').replace('.', '') + '$', + 'i' + ); + this._shortMonthsParse[i] = new RegExp( + '^' + this.monthsShort(mom, '').replace('.', '') + '$', + 'i' + ); + } + if (!strict && !this._monthsParse[i]) { + regex = + '^' + this.months(mom, '') + '|^' + this.monthsShort(mom, ''); + this._monthsParse[i] = new RegExp(regex.replace('.', ''), 'i'); + } + // test the regex + if ( + strict && + format === 'MMMM' && + this._longMonthsParse[i].test(monthName) + ) { + return i; + } else if ( + strict && + format === 'MMM' && + this._shortMonthsParse[i].test(monthName) + ) { + return i; + } else if (!strict && this._monthsParse[i].test(monthName)) { + return i; + } + } + } + + // MOMENTS + + function setMonth(mom, value) { + var dayOfMonth; + + if (!mom.isValid()) { + // No op + return mom; + } + + if (typeof value === 'string') { + if (/^\d+$/.test(value)) { + value = toInt(value); + } else { + value = mom.localeData().monthsParse(value); + // TODO: Another silent failure? + if (!isNumber(value)) { + return mom; + } + } + } + + dayOfMonth = Math.min(mom.date(), daysInMonth(mom.year(), value)); + mom._d['set' + (mom._isUTC ? 'UTC' : '') + 'Month'](value, dayOfMonth); + return mom; + } + + function getSetMonth(value) { + if (value != null) { + setMonth(this, value); + hooks.updateOffset(this, true); + return this; + } else { + return get(this, 'Month'); + } + } + + function getDaysInMonth() { + return daysInMonth(this.year(), this.month()); + } + + function monthsShortRegex(isStrict) { + if (this._monthsParseExact) { + if (!hasOwnProp(this, '_monthsRegex')) { + computeMonthsParse.call(this); + } + if (isStrict) { + return this._monthsShortStrictRegex; + } else { + return this._monthsShortRegex; + } + } else { + if (!hasOwnProp(this, '_monthsShortRegex')) { + this._monthsShortRegex = defaultMonthsShortRegex; + } + return this._monthsShortStrictRegex && isStrict + ? this._monthsShortStrictRegex + : this._monthsShortRegex; + } + } + + function monthsRegex(isStrict) { + if (this._monthsParseExact) { + if (!hasOwnProp(this, '_monthsRegex')) { + computeMonthsParse.call(this); + } + if (isStrict) { + return this._monthsStrictRegex; + } else { + return this._monthsRegex; + } + } else { + if (!hasOwnProp(this, '_monthsRegex')) { + this._monthsRegex = defaultMonthsRegex; + } + return this._monthsStrictRegex && isStrict + ? this._monthsStrictRegex + : this._monthsRegex; + } + } + + function computeMonthsParse() { + function cmpLenRev(a, b) { + return b.length - a.length; + } + + var shortPieces = [], + longPieces = [], + mixedPieces = [], + i, + mom; + for (i = 0; i < 12; i++) { + // make the regex if we don't have it already + mom = createUTC([2000, i]); + shortPieces.push(this.monthsShort(mom, '')); + longPieces.push(this.months(mom, '')); + mixedPieces.push(this.months(mom, '')); + mixedPieces.push(this.monthsShort(mom, '')); + } + // Sorting makes sure if one month (or abbr) is a prefix of another it + // will match the longer piece. + shortPieces.sort(cmpLenRev); + longPieces.sort(cmpLenRev); + mixedPieces.sort(cmpLenRev); + for (i = 0; i < 12; i++) { + shortPieces[i] = regexEscape(shortPieces[i]); + longPieces[i] = regexEscape(longPieces[i]); + } + for (i = 0; i < 24; i++) { + mixedPieces[i] = regexEscape(mixedPieces[i]); + } + + this._monthsRegex = new RegExp('^(' + mixedPieces.join('|') + ')', 'i'); + this._monthsShortRegex = this._monthsRegex; + this._monthsStrictRegex = new RegExp( + '^(' + longPieces.join('|') + ')', + 'i' + ); + this._monthsShortStrictRegex = new RegExp( + '^(' + shortPieces.join('|') + ')', + 'i' + ); + } + + // FORMATTING + + addFormatToken('Y', 0, 0, function () { + var y = this.year(); + return y <= 9999 ? zeroFill(y, 4) : '+' + y; + }); + + addFormatToken(0, ['YY', 2], 0, function () { + return this.year() % 100; + }); + + addFormatToken(0, ['YYYY', 4], 0, 'year'); + addFormatToken(0, ['YYYYY', 5], 0, 'year'); + addFormatToken(0, ['YYYYYY', 6, true], 0, 'year'); + + // ALIASES + + addUnitAlias('year', 'y'); + + // PRIORITIES + + addUnitPriority('year', 1); + + // PARSING + + addRegexToken('Y', matchSigned); + addRegexToken('YY', match1to2, match2); + addRegexToken('YYYY', match1to4, match4); + addRegexToken('YYYYY', match1to6, match6); + addRegexToken('YYYYYY', match1to6, match6); + + addParseToken(['YYYYY', 'YYYYYY'], YEAR); + addParseToken('YYYY', function (input, array) { + array[YEAR] = + input.length === 2 ? hooks.parseTwoDigitYear(input) : toInt(input); + }); + addParseToken('YY', function (input, array) { + array[YEAR] = hooks.parseTwoDigitYear(input); + }); + addParseToken('Y', function (input, array) { + array[YEAR] = parseInt(input, 10); + }); + + // HELPERS + + function daysInYear(year) { + return isLeapYear(year) ? 366 : 365; + } + + // HOOKS + + hooks.parseTwoDigitYear = function (input) { + return toInt(input) + (toInt(input) > 68 ? 1900 : 2000); + }; + + // MOMENTS + + var getSetYear = makeGetSet('FullYear', true); + + function getIsLeapYear() { + return isLeapYear(this.year()); + } + + function createDate(y, m, d, h, M, s, ms) { + // can't just apply() to create a date: + // https://stackoverflow.com/q/181348 + var date; + // the date constructor remaps years 0-99 to 1900-1999 + if (y < 100 && y >= 0) { + // preserve leap years using a full 400 year cycle, then reset + date = new Date(y + 400, m, d, h, M, s, ms); + if (isFinite(date.getFullYear())) { + date.setFullYear(y); + } + } else { + date = new Date(y, m, d, h, M, s, ms); + } + + return date; + } + + function createUTCDate(y) { + var date, args; + // the Date.UTC function remaps years 0-99 to 1900-1999 + if (y < 100 && y >= 0) { + args = Array.prototype.slice.call(arguments); + // preserve leap years using a full 400 year cycle, then reset + args[0] = y + 400; + date = new Date(Date.UTC.apply(null, args)); + if (isFinite(date.getUTCFullYear())) { + date.setUTCFullYear(y); + } + } else { + date = new Date(Date.UTC.apply(null, arguments)); + } + + return date; + } + + // start-of-first-week - start-of-year + function firstWeekOffset(year, dow, doy) { + var // first-week day -- which january is always in the first week (4 for iso, 1 for other) + fwd = 7 + dow - doy, + // first-week day local weekday -- which local weekday is fwd + fwdlw = (7 + createUTCDate(year, 0, fwd).getUTCDay() - dow) % 7; + + return -fwdlw + fwd - 1; + } + + // https://en.wikipedia.org/wiki/ISO_week_date#Calculating_a_date_given_the_year.2C_week_number_and_weekday + function dayOfYearFromWeeks(year, week, weekday, dow, doy) { + var localWeekday = (7 + weekday - dow) % 7, + weekOffset = firstWeekOffset(year, dow, doy), + dayOfYear = 1 + 7 * (week - 1) + localWeekday + weekOffset, + resYear, + resDayOfYear; + + if (dayOfYear <= 0) { + resYear = year - 1; + resDayOfYear = daysInYear(resYear) + dayOfYear; + } else if (dayOfYear > daysInYear(year)) { + resYear = year + 1; + resDayOfYear = dayOfYear - daysInYear(year); + } else { + resYear = year; + resDayOfYear = dayOfYear; + } + + return { + year: resYear, + dayOfYear: resDayOfYear, + }; + } + + function weekOfYear(mom, dow, doy) { + var weekOffset = firstWeekOffset(mom.year(), dow, doy), + week = Math.floor((mom.dayOfYear() - weekOffset - 1) / 7) + 1, + resWeek, + resYear; + + if (week < 1) { + resYear = mom.year() - 1; + resWeek = week + weeksInYear(resYear, dow, doy); + } else if (week > weeksInYear(mom.year(), dow, doy)) { + resWeek = week - weeksInYear(mom.year(), dow, doy); + resYear = mom.year() + 1; + } else { + resYear = mom.year(); + resWeek = week; + } + + return { + week: resWeek, + year: resYear, + }; + } + + function weeksInYear(year, dow, doy) { + var weekOffset = firstWeekOffset(year, dow, doy), + weekOffsetNext = firstWeekOffset(year + 1, dow, doy); + return (daysInYear(year) - weekOffset + weekOffsetNext) / 7; + } + + // FORMATTING + + addFormatToken('w', ['ww', 2], 'wo', 'week'); + addFormatToken('W', ['WW', 2], 'Wo', 'isoWeek'); + + // ALIASES + + addUnitAlias('week', 'w'); + addUnitAlias('isoWeek', 'W'); + + // PRIORITIES + + addUnitPriority('week', 5); + addUnitPriority('isoWeek', 5); + + // PARSING + + addRegexToken('w', match1to2); + addRegexToken('ww', match1to2, match2); + addRegexToken('W', match1to2); + addRegexToken('WW', match1to2, match2); + + addWeekParseToken(['w', 'ww', 'W', 'WW'], function ( + input, + week, + config, + token + ) { + week[token.substr(0, 1)] = toInt(input); + }); + + // HELPERS + + // LOCALES + + function localeWeek(mom) { + return weekOfYear(mom, this._week.dow, this._week.doy).week; + } + + var defaultLocaleWeek = { + dow: 0, // Sunday is the first day of the week. + doy: 6, // The week that contains Jan 6th is the first week of the year. + }; + + function localeFirstDayOfWeek() { + return this._week.dow; + } + + function localeFirstDayOfYear() { + return this._week.doy; + } + + // MOMENTS + + function getSetWeek(input) { + var week = this.localeData().week(this); + return input == null ? week : this.add((input - week) * 7, 'd'); + } + + function getSetISOWeek(input) { + var week = weekOfYear(this, 1, 4).week; + return input == null ? week : this.add((input - week) * 7, 'd'); + } + + // FORMATTING + + addFormatToken('d', 0, 'do', 'day'); + + addFormatToken('dd', 0, 0, function (format) { + return this.localeData().weekdaysMin(this, format); + }); + + addFormatToken('ddd', 0, 0, function (format) { + return this.localeData().weekdaysShort(this, format); + }); + + addFormatToken('dddd', 0, 0, function (format) { + return this.localeData().weekdays(this, format); + }); + + addFormatToken('e', 0, 0, 'weekday'); + addFormatToken('E', 0, 0, 'isoWeekday'); + + // ALIASES + + addUnitAlias('day', 'd'); + addUnitAlias('weekday', 'e'); + addUnitAlias('isoWeekday', 'E'); + + // PRIORITY + addUnitPriority('day', 11); + addUnitPriority('weekday', 11); + addUnitPriority('isoWeekday', 11); + + // PARSING + + addRegexToken('d', match1to2); + addRegexToken('e', match1to2); + addRegexToken('E', match1to2); + addRegexToken('dd', function (isStrict, locale) { + return locale.weekdaysMinRegex(isStrict); + }); + addRegexToken('ddd', function (isStrict, locale) { + return locale.weekdaysShortRegex(isStrict); + }); + addRegexToken('dddd', function (isStrict, locale) { + return locale.weekdaysRegex(isStrict); + }); + + addWeekParseToken(['dd', 'ddd', 'dddd'], function (input, week, config, token) { + var weekday = config._locale.weekdaysParse(input, token, config._strict); + // if we didn't get a weekday name, mark the date as invalid + if (weekday != null) { + week.d = weekday; + } else { + getParsingFlags(config).invalidWeekday = input; + } + }); + + addWeekParseToken(['d', 'e', 'E'], function (input, week, config, token) { + week[token] = toInt(input); + }); + + // HELPERS + + function parseWeekday(input, locale) { + if (typeof input !== 'string') { + return input; + } + + if (!isNaN(input)) { + return parseInt(input, 10); + } + + input = locale.weekdaysParse(input); + if (typeof input === 'number') { + return input; + } + + return null; + } + + function parseIsoWeekday(input, locale) { + if (typeof input === 'string') { + return locale.weekdaysParse(input) % 7 || 7; + } + return isNaN(input) ? null : input; + } + + // LOCALES + function shiftWeekdays(ws, n) { + return ws.slice(n, 7).concat(ws.slice(0, n)); + } + + var defaultLocaleWeekdays = 'Sunday_Monday_Tuesday_Wednesday_Thursday_Friday_Saturday'.split( + '_' + ), + defaultLocaleWeekdaysShort = 'Sun_Mon_Tue_Wed_Thu_Fri_Sat'.split('_'), + defaultLocaleWeekdaysMin = 'Su_Mo_Tu_We_Th_Fr_Sa'.split('_'), + defaultWeekdaysRegex = matchWord, + defaultWeekdaysShortRegex = matchWord, + defaultWeekdaysMinRegex = matchWord; + + function localeWeekdays(m, format) { + var weekdays = isArray(this._weekdays) + ? this._weekdays + : this._weekdays[ + m && m !== true && this._weekdays.isFormat.test(format) + ? 'format' + : 'standalone' + ]; + return m === true + ? shiftWeekdays(weekdays, this._week.dow) + : m + ? weekdays[m.day()] + : weekdays; + } + + function localeWeekdaysShort(m) { + return m === true + ? shiftWeekdays(this._weekdaysShort, this._week.dow) + : m + ? this._weekdaysShort[m.day()] + : this._weekdaysShort; + } + + function localeWeekdaysMin(m) { + return m === true + ? shiftWeekdays(this._weekdaysMin, this._week.dow) + : m + ? this._weekdaysMin[m.day()] + : this._weekdaysMin; + } + + function handleStrictParse$1(weekdayName, format, strict) { + var i, + ii, + mom, + llc = weekdayName.toLocaleLowerCase(); + if (!this._weekdaysParse) { + this._weekdaysParse = []; + this._shortWeekdaysParse = []; + this._minWeekdaysParse = []; + + for (i = 0; i < 7; ++i) { + mom = createUTC([2000, 1]).day(i); + this._minWeekdaysParse[i] = this.weekdaysMin( + mom, + '' + ).toLocaleLowerCase(); + this._shortWeekdaysParse[i] = this.weekdaysShort( + mom, + '' + ).toLocaleLowerCase(); + this._weekdaysParse[i] = this.weekdays(mom, '').toLocaleLowerCase(); + } + } + + if (strict) { + if (format === 'dddd') { + ii = indexOf.call(this._weekdaysParse, llc); + return ii !== -1 ? ii : null; + } else if (format === 'ddd') { + ii = indexOf.call(this._shortWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } else { + ii = indexOf.call(this._minWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } + } else { + if (format === 'dddd') { + ii = indexOf.call(this._weekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._shortWeekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._minWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } else if (format === 'ddd') { + ii = indexOf.call(this._shortWeekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._weekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._minWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } else { + ii = indexOf.call(this._minWeekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._weekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._shortWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } + } + } + + function localeWeekdaysParse(weekdayName, format, strict) { + var i, mom, regex; + + if (this._weekdaysParseExact) { + return handleStrictParse$1.call(this, weekdayName, format, strict); + } + + if (!this._weekdaysParse) { + this._weekdaysParse = []; + this._minWeekdaysParse = []; + this._shortWeekdaysParse = []; + this._fullWeekdaysParse = []; + } + + for (i = 0; i < 7; i++) { + // make the regex if we don't have it already + + mom = createUTC([2000, 1]).day(i); + if (strict && !this._fullWeekdaysParse[i]) { + this._fullWeekdaysParse[i] = new RegExp( + '^' + this.weekdays(mom, '').replace('.', '\\.?') + '$', + 'i' + ); + this._shortWeekdaysParse[i] = new RegExp( + '^' + this.weekdaysShort(mom, '').replace('.', '\\.?') + '$', + 'i' + ); + this._minWeekdaysParse[i] = new RegExp( + '^' + this.weekdaysMin(mom, '').replace('.', '\\.?') + '$', + 'i' + ); + } + if (!this._weekdaysParse[i]) { + regex = + '^' + + this.weekdays(mom, '') + + '|^' + + this.weekdaysShort(mom, '') + + '|^' + + this.weekdaysMin(mom, ''); + this._weekdaysParse[i] = new RegExp(regex.replace('.', ''), 'i'); + } + // test the regex + if ( + strict && + format === 'dddd' && + this._fullWeekdaysParse[i].test(weekdayName) + ) { + return i; + } else if ( + strict && + format === 'ddd' && + this._shortWeekdaysParse[i].test(weekdayName) + ) { + return i; + } else if ( + strict && + format === 'dd' && + this._minWeekdaysParse[i].test(weekdayName) + ) { + return i; + } else if (!strict && this._weekdaysParse[i].test(weekdayName)) { + return i; + } + } + } + + // MOMENTS + + function getSetDayOfWeek(input) { + if (!this.isValid()) { + return input != null ? this : NaN; + } + var day = this._isUTC ? this._d.getUTCDay() : this._d.getDay(); + if (input != null) { + input = parseWeekday(input, this.localeData()); + return this.add(input - day, 'd'); + } else { + return day; + } + } + + function getSetLocaleDayOfWeek(input) { + if (!this.isValid()) { + return input != null ? this : NaN; + } + var weekday = (this.day() + 7 - this.localeData()._week.dow) % 7; + return input == null ? weekday : this.add(input - weekday, 'd'); + } + + function getSetISODayOfWeek(input) { + if (!this.isValid()) { + return input != null ? this : NaN; + } + + // behaves the same as moment#day except + // as a getter, returns 7 instead of 0 (1-7 range instead of 0-6) + // as a setter, sunday should belong to the previous week. + + if (input != null) { + var weekday = parseIsoWeekday(input, this.localeData()); + return this.day(this.day() % 7 ? weekday : weekday - 7); + } else { + return this.day() || 7; + } + } + + function weekdaysRegex(isStrict) { + if (this._weekdaysParseExact) { + if (!hasOwnProp(this, '_weekdaysRegex')) { + computeWeekdaysParse.call(this); + } + if (isStrict) { + return this._weekdaysStrictRegex; + } else { + return this._weekdaysRegex; + } + } else { + if (!hasOwnProp(this, '_weekdaysRegex')) { + this._weekdaysRegex = defaultWeekdaysRegex; + } + return this._weekdaysStrictRegex && isStrict + ? this._weekdaysStrictRegex + : this._weekdaysRegex; + } + } + + function weekdaysShortRegex(isStrict) { + if (this._weekdaysParseExact) { + if (!hasOwnProp(this, '_weekdaysRegex')) { + computeWeekdaysParse.call(this); + } + if (isStrict) { + return this._weekdaysShortStrictRegex; + } else { + return this._weekdaysShortRegex; + } + } else { + if (!hasOwnProp(this, '_weekdaysShortRegex')) { + this._weekdaysShortRegex = defaultWeekdaysShortRegex; + } + return this._weekdaysShortStrictRegex && isStrict + ? this._weekdaysShortStrictRegex + : this._weekdaysShortRegex; + } + } + + function weekdaysMinRegex(isStrict) { + if (this._weekdaysParseExact) { + if (!hasOwnProp(this, '_weekdaysRegex')) { + computeWeekdaysParse.call(this); + } + if (isStrict) { + return this._weekdaysMinStrictRegex; + } else { + return this._weekdaysMinRegex; + } + } else { + if (!hasOwnProp(this, '_weekdaysMinRegex')) { + this._weekdaysMinRegex = defaultWeekdaysMinRegex; + } + return this._weekdaysMinStrictRegex && isStrict + ? this._weekdaysMinStrictRegex + : this._weekdaysMinRegex; + } + } + + function computeWeekdaysParse() { + function cmpLenRev(a, b) { + return b.length - a.length; + } + + var minPieces = [], + shortPieces = [], + longPieces = [], + mixedPieces = [], + i, + mom, + minp, + shortp, + longp; + for (i = 0; i < 7; i++) { + // make the regex if we don't have it already + mom = createUTC([2000, 1]).day(i); + minp = regexEscape(this.weekdaysMin(mom, '')); + shortp = regexEscape(this.weekdaysShort(mom, '')); + longp = regexEscape(this.weekdays(mom, '')); + minPieces.push(minp); + shortPieces.push(shortp); + longPieces.push(longp); + mixedPieces.push(minp); + mixedPieces.push(shortp); + mixedPieces.push(longp); + } + // Sorting makes sure if one weekday (or abbr) is a prefix of another it + // will match the longer piece. + minPieces.sort(cmpLenRev); + shortPieces.sort(cmpLenRev); + longPieces.sort(cmpLenRev); + mixedPieces.sort(cmpLenRev); + + this._weekdaysRegex = new RegExp('^(' + mixedPieces.join('|') + ')', 'i'); + this._weekdaysShortRegex = this._weekdaysRegex; + this._weekdaysMinRegex = this._weekdaysRegex; + + this._weekdaysStrictRegex = new RegExp( + '^(' + longPieces.join('|') + ')', + 'i' + ); + this._weekdaysShortStrictRegex = new RegExp( + '^(' + shortPieces.join('|') + ')', + 'i' + ); + this._weekdaysMinStrictRegex = new RegExp( + '^(' + minPieces.join('|') + ')', + 'i' + ); + } + + // FORMATTING + + function hFormat() { + return this.hours() % 12 || 12; + } + + function kFormat() { + return this.hours() || 24; + } + + addFormatToken('H', ['HH', 2], 0, 'hour'); + addFormatToken('h', ['hh', 2], 0, hFormat); + addFormatToken('k', ['kk', 2], 0, kFormat); + + addFormatToken('hmm', 0, 0, function () { + return '' + hFormat.apply(this) + zeroFill(this.minutes(), 2); + }); + + addFormatToken('hmmss', 0, 0, function () { + return ( + '' + + hFormat.apply(this) + + zeroFill(this.minutes(), 2) + + zeroFill(this.seconds(), 2) + ); + }); + + addFormatToken('Hmm', 0, 0, function () { + return '' + this.hours() + zeroFill(this.minutes(), 2); + }); + + addFormatToken('Hmmss', 0, 0, function () { + return ( + '' + + this.hours() + + zeroFill(this.minutes(), 2) + + zeroFill(this.seconds(), 2) + ); + }); + + function meridiem(token, lowercase) { + addFormatToken(token, 0, 0, function () { + return this.localeData().meridiem( + this.hours(), + this.minutes(), + lowercase + ); + }); + } + + meridiem('a', true); + meridiem('A', false); + + // ALIASES + + addUnitAlias('hour', 'h'); + + // PRIORITY + addUnitPriority('hour', 13); + + // PARSING + + function matchMeridiem(isStrict, locale) { + return locale._meridiemParse; + } + + addRegexToken('a', matchMeridiem); + addRegexToken('A', matchMeridiem); + addRegexToken('H', match1to2); + addRegexToken('h', match1to2); + addRegexToken('k', match1to2); + addRegexToken('HH', match1to2, match2); + addRegexToken('hh', match1to2, match2); + addRegexToken('kk', match1to2, match2); + + addRegexToken('hmm', match3to4); + addRegexToken('hmmss', match5to6); + addRegexToken('Hmm', match3to4); + addRegexToken('Hmmss', match5to6); + + addParseToken(['H', 'HH'], HOUR); + addParseToken(['k', 'kk'], function (input, array, config) { + var kInput = toInt(input); + array[HOUR] = kInput === 24 ? 0 : kInput; + }); + addParseToken(['a', 'A'], function (input, array, config) { + config._isPm = config._locale.isPM(input); + config._meridiem = input; + }); + addParseToken(['h', 'hh'], function (input, array, config) { + array[HOUR] = toInt(input); + getParsingFlags(config).bigHour = true; + }); + addParseToken('hmm', function (input, array, config) { + var pos = input.length - 2; + array[HOUR] = toInt(input.substr(0, pos)); + array[MINUTE] = toInt(input.substr(pos)); + getParsingFlags(config).bigHour = true; + }); + addParseToken('hmmss', function (input, array, config) { + var pos1 = input.length - 4, + pos2 = input.length - 2; + array[HOUR] = toInt(input.substr(0, pos1)); + array[MINUTE] = toInt(input.substr(pos1, 2)); + array[SECOND] = toInt(input.substr(pos2)); + getParsingFlags(config).bigHour = true; + }); + addParseToken('Hmm', function (input, array, config) { + var pos = input.length - 2; + array[HOUR] = toInt(input.substr(0, pos)); + array[MINUTE] = toInt(input.substr(pos)); + }); + addParseToken('Hmmss', function (input, array, config) { + var pos1 = input.length - 4, + pos2 = input.length - 2; + array[HOUR] = toInt(input.substr(0, pos1)); + array[MINUTE] = toInt(input.substr(pos1, 2)); + array[SECOND] = toInt(input.substr(pos2)); + }); + + // LOCALES + + function localeIsPM(input) { + // IE8 Quirks Mode & IE7 Standards Mode do not allow accessing strings like arrays + // Using charAt should be more compatible. + return (input + '').toLowerCase().charAt(0) === 'p'; + } + + var defaultLocaleMeridiemParse = /[ap]\.?m?\.?/i, + // Setting the hour should keep the time, because the user explicitly + // specified which hour they want. So trying to maintain the same hour (in + // a new timezone) makes sense. Adding/subtracting hours does not follow + // this rule. + getSetHour = makeGetSet('Hours', true); + + function localeMeridiem(hours, minutes, isLower) { + if (hours > 11) { + return isLower ? 'pm' : 'PM'; + } else { + return isLower ? 'am' : 'AM'; + } + } + + var baseConfig = { + calendar: defaultCalendar, + longDateFormat: defaultLongDateFormat, + invalidDate: defaultInvalidDate, + ordinal: defaultOrdinal, + dayOfMonthOrdinalParse: defaultDayOfMonthOrdinalParse, + relativeTime: defaultRelativeTime, + + months: defaultLocaleMonths, + monthsShort: defaultLocaleMonthsShort, + + week: defaultLocaleWeek, + + weekdays: defaultLocaleWeekdays, + weekdaysMin: defaultLocaleWeekdaysMin, + weekdaysShort: defaultLocaleWeekdaysShort, + + meridiemParse: defaultLocaleMeridiemParse, + }; + + // internal storage for locale config files + var locales = {}, + localeFamilies = {}, + globalLocale; + + function commonPrefix(arr1, arr2) { + var i, + minl = Math.min(arr1.length, arr2.length); + for (i = 0; i < minl; i += 1) { + if (arr1[i] !== arr2[i]) { + return i; + } + } + return minl; + } + + function normalizeLocale(key) { + return key ? key.toLowerCase().replace('_', '-') : key; + } + + // pick the locale from the array + // try ['en-au', 'en-gb'] as 'en-au', 'en-gb', 'en', as in move through the list trying each + // substring from most specific to least, but move to the next array item if it's a more specific variant than the current root + function chooseLocale(names) { + var i = 0, + j, + next, + locale, + split; + + while (i < names.length) { + split = normalizeLocale(names[i]).split('-'); + j = split.length; + next = normalizeLocale(names[i + 1]); + next = next ? next.split('-') : null; + while (j > 0) { + locale = loadLocale(split.slice(0, j).join('-')); + if (locale) { + return locale; + } + if ( + next && + next.length >= j && + commonPrefix(split, next) >= j - 1 + ) { + //the next array item is better than a shallower substring of this one + break; + } + j--; + } + i++; + } + return globalLocale; + } + + function loadLocale(name) { + var oldLocale = null, + aliasedRequire; + // TODO: Find a better way to register and load all the locales in Node + if ( + locales[name] === undefined && + "object" !== 'undefined' && + module && + module.exports + ) { + try { + oldLocale = globalLocale._abbr; + aliasedRequire = require; + aliasedRequire('./locale/' + name); + getSetGlobalLocale(oldLocale); + } catch (e) { + // mark as not found to avoid repeating expensive file require call causing high CPU + // when trying to find en-US, en_US, en-us for every format call + locales[name] = null; // null means not found + } + } + return locales[name]; + } + + // This function will load locale and then set the global locale. If + // no arguments are passed in, it will simply return the current global + // locale key. + function getSetGlobalLocale(key, values) { + var data; + if (key) { + if (isUndefined(values)) { + data = getLocale(key); + } else { + data = defineLocale(key, values); + } + + if (data) { + // moment.duration._locale = moment._locale = data; + globalLocale = data; + } else { + if (typeof console !== 'undefined' && console.warn) { + //warn user if arguments are passed but the locale could not be set + console.warn( + 'Locale ' + key + ' not found. Did you forget to load it?' + ); + } + } + } + + return globalLocale._abbr; + } + + function defineLocale(name, config) { + if (config !== null) { + var locale, + parentConfig = baseConfig; + config.abbr = name; + if (locales[name] != null) { + deprecateSimple( + 'defineLocaleOverride', + 'use moment.updateLocale(localeName, config) to change ' + + 'an existing locale. moment.defineLocale(localeName, ' + + 'config) should only be used for creating a new locale ' + + 'See http://momentjs.com/guides/#/warnings/define-locale/ for more info.' + ); + parentConfig = locales[name]._config; + } else if (config.parentLocale != null) { + if (locales[config.parentLocale] != null) { + parentConfig = locales[config.parentLocale]._config; + } else { + locale = loadLocale(config.parentLocale); + if (locale != null) { + parentConfig = locale._config; + } else { + if (!localeFamilies[config.parentLocale]) { + localeFamilies[config.parentLocale] = []; + } + localeFamilies[config.parentLocale].push({ + name: name, + config: config, + }); + return null; + } + } + } + locales[name] = new Locale(mergeConfigs(parentConfig, config)); + + if (localeFamilies[name]) { + localeFamilies[name].forEach(function (x) { + defineLocale(x.name, x.config); + }); + } + + // backwards compat for now: also set the locale + // make sure we set the locale AFTER all child locales have been + // created, so we won't end up with the child locale set. + getSetGlobalLocale(name); + + return locales[name]; + } else { + // useful for testing + delete locales[name]; + return null; + } + } + + function updateLocale(name, config) { + if (config != null) { + var locale, + tmpLocale, + parentConfig = baseConfig; + + if (locales[name] != null && locales[name].parentLocale != null) { + // Update existing child locale in-place to avoid memory-leaks + locales[name].set(mergeConfigs(locales[name]._config, config)); + } else { + // MERGE + tmpLocale = loadLocale(name); + if (tmpLocale != null) { + parentConfig = tmpLocale._config; + } + config = mergeConfigs(parentConfig, config); + if (tmpLocale == null) { + // updateLocale is called for creating a new locale + // Set abbr so it will have a name (getters return + // undefined otherwise). + config.abbr = name; + } + locale = new Locale(config); + locale.parentLocale = locales[name]; + locales[name] = locale; + } + + // backwards compat for now: also set the locale + getSetGlobalLocale(name); + } else { + // pass null for config to unupdate, useful for tests + if (locales[name] != null) { + if (locales[name].parentLocale != null) { + locales[name] = locales[name].parentLocale; + if (name === getSetGlobalLocale()) { + getSetGlobalLocale(name); + } + } else if (locales[name] != null) { + delete locales[name]; + } + } + } + return locales[name]; + } + + // returns locale data + function getLocale(key) { + var locale; + + if (key && key._locale && key._locale._abbr) { + key = key._locale._abbr; + } + + if (!key) { + return globalLocale; + } + + if (!isArray(key)) { + //short-circuit everything else + locale = loadLocale(key); + if (locale) { + return locale; + } + key = [key]; + } + + return chooseLocale(key); + } + + function listLocales() { + return keys(locales); + } + + function checkOverflow(m) { + var overflow, + a = m._a; + + if (a && getParsingFlags(m).overflow === -2) { + overflow = + a[MONTH] < 0 || a[MONTH] > 11 + ? MONTH + : a[DATE] < 1 || a[DATE] > daysInMonth(a[YEAR], a[MONTH]) + ? DATE + : a[HOUR] < 0 || + a[HOUR] > 24 || + (a[HOUR] === 24 && + (a[MINUTE] !== 0 || + a[SECOND] !== 0 || + a[MILLISECOND] !== 0)) + ? HOUR + : a[MINUTE] < 0 || a[MINUTE] > 59 + ? MINUTE + : a[SECOND] < 0 || a[SECOND] > 59 + ? SECOND + : a[MILLISECOND] < 0 || a[MILLISECOND] > 999 + ? MILLISECOND + : -1; + + if ( + getParsingFlags(m)._overflowDayOfYear && + (overflow < YEAR || overflow > DATE) + ) { + overflow = DATE; + } + if (getParsingFlags(m)._overflowWeeks && overflow === -1) { + overflow = WEEK; + } + if (getParsingFlags(m)._overflowWeekday && overflow === -1) { + overflow = WEEKDAY; + } + + getParsingFlags(m).overflow = overflow; + } + + return m; + } + + // iso 8601 regex + // 0000-00-00 0000-W00 or 0000-W00-0 + T + 00 or 00:00 or 00:00:00 or 00:00:00.000 + +00:00 or +0000 or +00) + var extendedIsoRegex = /^\s*((?:[+-]\d{6}|\d{4})-(?:\d\d-\d\d|W\d\d-\d|W\d\d|\d\d\d|\d\d))(?:(T| )(\d\d(?::\d\d(?::\d\d(?:[.,]\d+)?)?)?)([+-]\d\d(?::?\d\d)?|\s*Z)?)?$/, + basicIsoRegex = /^\s*((?:[+-]\d{6}|\d{4})(?:\d\d\d\d|W\d\d\d|W\d\d|\d\d\d|\d\d|))(?:(T| )(\d\d(?:\d\d(?:\d\d(?:[.,]\d+)?)?)?)([+-]\d\d(?::?\d\d)?|\s*Z)?)?$/, + tzRegex = /Z|[+-]\d\d(?::?\d\d)?/, + isoDates = [ + ['YYYYYY-MM-DD', /[+-]\d{6}-\d\d-\d\d/], + ['YYYY-MM-DD', /\d{4}-\d\d-\d\d/], + ['GGGG-[W]WW-E', /\d{4}-W\d\d-\d/], + ['GGGG-[W]WW', /\d{4}-W\d\d/, false], + ['YYYY-DDD', /\d{4}-\d{3}/], + ['YYYY-MM', /\d{4}-\d\d/, false], + ['YYYYYYMMDD', /[+-]\d{10}/], + ['YYYYMMDD', /\d{8}/], + ['GGGG[W]WWE', /\d{4}W\d{3}/], + ['GGGG[W]WW', /\d{4}W\d{2}/, false], + ['YYYYDDD', /\d{7}/], + ['YYYYMM', /\d{6}/, false], + ['YYYY', /\d{4}/, false], + ], + // iso time formats and regexes + isoTimes = [ + ['HH:mm:ss.SSSS', /\d\d:\d\d:\d\d\.\d+/], + ['HH:mm:ss,SSSS', /\d\d:\d\d:\d\d,\d+/], + ['HH:mm:ss', /\d\d:\d\d:\d\d/], + ['HH:mm', /\d\d:\d\d/], + ['HHmmss.SSSS', /\d\d\d\d\d\d\.\d+/], + ['HHmmss,SSSS', /\d\d\d\d\d\d,\d+/], + ['HHmmss', /\d\d\d\d\d\d/], + ['HHmm', /\d\d\d\d/], + ['HH', /\d\d/], + ], + aspNetJsonRegex = /^\/?Date\((-?\d+)/i, + // RFC 2822 regex: For details see https://tools.ietf.org/html/rfc2822#section-3.3 + rfc2822 = /^(?:(Mon|Tue|Wed|Thu|Fri|Sat|Sun),?\s)?(\d{1,2})\s(Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec)\s(\d{2,4})\s(\d\d):(\d\d)(?::(\d\d))?\s(?:(UT|GMT|[ECMP][SD]T)|([Zz])|([+-]\d{4}))$/, + obsOffsets = { + UT: 0, + GMT: 0, + EDT: -4 * 60, + EST: -5 * 60, + CDT: -5 * 60, + CST: -6 * 60, + MDT: -6 * 60, + MST: -7 * 60, + PDT: -7 * 60, + PST: -8 * 60, + }; + + // date from iso format + function configFromISO(config) { + var i, + l, + string = config._i, + match = extendedIsoRegex.exec(string) || basicIsoRegex.exec(string), + allowTime, + dateFormat, + timeFormat, + tzFormat; + + if (match) { + getParsingFlags(config).iso = true; + + for (i = 0, l = isoDates.length; i < l; i++) { + if (isoDates[i][1].exec(match[1])) { + dateFormat = isoDates[i][0]; + allowTime = isoDates[i][2] !== false; + break; + } + } + if (dateFormat == null) { + config._isValid = false; + return; + } + if (match[3]) { + for (i = 0, l = isoTimes.length; i < l; i++) { + if (isoTimes[i][1].exec(match[3])) { + // match[2] should be 'T' or space + timeFormat = (match[2] || ' ') + isoTimes[i][0]; + break; + } + } + if (timeFormat == null) { + config._isValid = false; + return; + } + } + if (!allowTime && timeFormat != null) { + config._isValid = false; + return; + } + if (match[4]) { + if (tzRegex.exec(match[4])) { + tzFormat = 'Z'; + } else { + config._isValid = false; + return; + } + } + config._f = dateFormat + (timeFormat || '') + (tzFormat || ''); + configFromStringAndFormat(config); + } else { + config._isValid = false; + } + } + + function extractFromRFC2822Strings( + yearStr, + monthStr, + dayStr, + hourStr, + minuteStr, + secondStr + ) { + var result = [ + untruncateYear(yearStr), + defaultLocaleMonthsShort.indexOf(monthStr), + parseInt(dayStr, 10), + parseInt(hourStr, 10), + parseInt(minuteStr, 10), + ]; + + if (secondStr) { + result.push(parseInt(secondStr, 10)); + } + + return result; + } + + function untruncateYear(yearStr) { + var year = parseInt(yearStr, 10); + if (year <= 49) { + return 2000 + year; + } else if (year <= 999) { + return 1900 + year; + } + return year; + } + + function preprocessRFC2822(s) { + // Remove comments and folding whitespace and replace multiple-spaces with a single space + return s + .replace(/\([^)]*\)|[\n\t]/g, ' ') + .replace(/(\s\s+)/g, ' ') + .replace(/^\s\s*/, '') + .replace(/\s\s*$/, ''); + } + + function checkWeekday(weekdayStr, parsedInput, config) { + if (weekdayStr) { + // TODO: Replace the vanilla JS Date object with an independent day-of-week check. + var weekdayProvided = defaultLocaleWeekdaysShort.indexOf(weekdayStr), + weekdayActual = new Date( + parsedInput[0], + parsedInput[1], + parsedInput[2] + ).getDay(); + if (weekdayProvided !== weekdayActual) { + getParsingFlags(config).weekdayMismatch = true; + config._isValid = false; + return false; + } + } + return true; + } + + function calculateOffset(obsOffset, militaryOffset, numOffset) { + if (obsOffset) { + return obsOffsets[obsOffset]; + } else if (militaryOffset) { + // the only allowed military tz is Z + return 0; + } else { + var hm = parseInt(numOffset, 10), + m = hm % 100, + h = (hm - m) / 100; + return h * 60 + m; + } + } + + // date and time from ref 2822 format + function configFromRFC2822(config) { + var match = rfc2822.exec(preprocessRFC2822(config._i)), + parsedArray; + if (match) { + parsedArray = extractFromRFC2822Strings( + match[4], + match[3], + match[2], + match[5], + match[6], + match[7] + ); + if (!checkWeekday(match[1], parsedArray, config)) { + return; + } + + config._a = parsedArray; + config._tzm = calculateOffset(match[8], match[9], match[10]); + + config._d = createUTCDate.apply(null, config._a); + config._d.setUTCMinutes(config._d.getUTCMinutes() - config._tzm); + + getParsingFlags(config).rfc2822 = true; + } else { + config._isValid = false; + } + } + + // date from 1) ASP.NET, 2) ISO, 3) RFC 2822 formats, or 4) optional fallback if parsing isn't strict + function configFromString(config) { + var matched = aspNetJsonRegex.exec(config._i); + if (matched !== null) { + config._d = new Date(+matched[1]); + return; + } + + configFromISO(config); + if (config._isValid === false) { + delete config._isValid; + } else { + return; + } + + configFromRFC2822(config); + if (config._isValid === false) { + delete config._isValid; + } else { + return; + } + + if (config._strict) { + config._isValid = false; + } else { + // Final attempt, use Input Fallback + hooks.createFromInputFallback(config); + } + } + + hooks.createFromInputFallback = deprecate( + 'value provided is not in a recognized RFC2822 or ISO format. moment construction falls back to js Date(), ' + + 'which is not reliable across all browsers and versions. Non RFC2822/ISO date formats are ' + + 'discouraged. Please refer to http://momentjs.com/guides/#/warnings/js-date/ for more info.', + function (config) { + config._d = new Date(config._i + (config._useUTC ? ' UTC' : '')); + } + ); + + // Pick the first defined of two or three arguments. + function defaults(a, b, c) { + if (a != null) { + return a; + } + if (b != null) { + return b; + } + return c; + } + + function currentDateArray(config) { + // hooks is actually the exported moment object + var nowValue = new Date(hooks.now()); + if (config._useUTC) { + return [ + nowValue.getUTCFullYear(), + nowValue.getUTCMonth(), + nowValue.getUTCDate(), + ]; + } + return [nowValue.getFullYear(), nowValue.getMonth(), nowValue.getDate()]; + } + + // convert an array to a date. + // the array should mirror the parameters below + // note: all values past the year are optional and will default to the lowest possible value. + // [year, month, day , hour, minute, second, millisecond] + function configFromArray(config) { + var i, + date, + input = [], + currentDate, + expectedWeekday, + yearToUse; + + if (config._d) { + return; + } + + currentDate = currentDateArray(config); + + //compute day of the year from weeks and weekdays + if (config._w && config._a[DATE] == null && config._a[MONTH] == null) { + dayOfYearFromWeekInfo(config); + } + + //if the day of the year is set, figure out what it is + if (config._dayOfYear != null) { + yearToUse = defaults(config._a[YEAR], currentDate[YEAR]); + + if ( + config._dayOfYear > daysInYear(yearToUse) || + config._dayOfYear === 0 + ) { + getParsingFlags(config)._overflowDayOfYear = true; + } + + date = createUTCDate(yearToUse, 0, config._dayOfYear); + config._a[MONTH] = date.getUTCMonth(); + config._a[DATE] = date.getUTCDate(); + } + + // Default to current date. + // * if no year, month, day of month are given, default to today + // * if day of month is given, default month and year + // * if month is given, default only year + // * if year is given, don't default anything + for (i = 0; i < 3 && config._a[i] == null; ++i) { + config._a[i] = input[i] = currentDate[i]; + } + + // Zero out whatever was not defaulted, including time + for (; i < 7; i++) { + config._a[i] = input[i] = + config._a[i] == null ? (i === 2 ? 1 : 0) : config._a[i]; + } + + // Check for 24:00:00.000 + if ( + config._a[HOUR] === 24 && + config._a[MINUTE] === 0 && + config._a[SECOND] === 0 && + config._a[MILLISECOND] === 0 + ) { + config._nextDay = true; + config._a[HOUR] = 0; + } + + config._d = (config._useUTC ? createUTCDate : createDate).apply( + null, + input + ); + expectedWeekday = config._useUTC + ? config._d.getUTCDay() + : config._d.getDay(); + + // Apply timezone offset from input. The actual utcOffset can be changed + // with parseZone. + if (config._tzm != null) { + config._d.setUTCMinutes(config._d.getUTCMinutes() - config._tzm); + } + + if (config._nextDay) { + config._a[HOUR] = 24; + } + + // check for mismatching day of week + if ( + config._w && + typeof config._w.d !== 'undefined' && + config._w.d !== expectedWeekday + ) { + getParsingFlags(config).weekdayMismatch = true; + } + } + + function dayOfYearFromWeekInfo(config) { + var w, weekYear, week, weekday, dow, doy, temp, weekdayOverflow, curWeek; + + w = config._w; + if (w.GG != null || w.W != null || w.E != null) { + dow = 1; + doy = 4; + + // TODO: We need to take the current isoWeekYear, but that depends on + // how we interpret now (local, utc, fixed offset). So create + // a now version of current config (take local/utc/offset flags, and + // create now). + weekYear = defaults( + w.GG, + config._a[YEAR], + weekOfYear(createLocal(), 1, 4).year + ); + week = defaults(w.W, 1); + weekday = defaults(w.E, 1); + if (weekday < 1 || weekday > 7) { + weekdayOverflow = true; + } + } else { + dow = config._locale._week.dow; + doy = config._locale._week.doy; + + curWeek = weekOfYear(createLocal(), dow, doy); + + weekYear = defaults(w.gg, config._a[YEAR], curWeek.year); + + // Default to current week. + week = defaults(w.w, curWeek.week); + + if (w.d != null) { + // weekday -- low day numbers are considered next week + weekday = w.d; + if (weekday < 0 || weekday > 6) { + weekdayOverflow = true; + } + } else if (w.e != null) { + // local weekday -- counting starts from beginning of week + weekday = w.e + dow; + if (w.e < 0 || w.e > 6) { + weekdayOverflow = true; + } + } else { + // default to beginning of week + weekday = dow; + } + } + if (week < 1 || week > weeksInYear(weekYear, dow, doy)) { + getParsingFlags(config)._overflowWeeks = true; + } else if (weekdayOverflow != null) { + getParsingFlags(config)._overflowWeekday = true; + } else { + temp = dayOfYearFromWeeks(weekYear, week, weekday, dow, doy); + config._a[YEAR] = temp.year; + config._dayOfYear = temp.dayOfYear; + } + } + + // constant that refers to the ISO standard + hooks.ISO_8601 = function () {}; + + // constant that refers to the RFC 2822 form + hooks.RFC_2822 = function () {}; + + // date from string and format string + function configFromStringAndFormat(config) { + // TODO: Move this to another part of the creation flow to prevent circular deps + if (config._f === hooks.ISO_8601) { + configFromISO(config); + return; + } + if (config._f === hooks.RFC_2822) { + configFromRFC2822(config); + return; + } + config._a = []; + getParsingFlags(config).empty = true; + + // This array is used to make a Date, either with `new Date` or `Date.UTC` + var string = '' + config._i, + i, + parsedInput, + tokens, + token, + skipped, + stringLength = string.length, + totalParsedInputLength = 0, + era; + + tokens = + expandFormat(config._f, config._locale).match(formattingTokens) || []; + + for (i = 0; i < tokens.length; i++) { + token = tokens[i]; + parsedInput = (string.match(getParseRegexForToken(token, config)) || + [])[0]; + if (parsedInput) { + skipped = string.substr(0, string.indexOf(parsedInput)); + if (skipped.length > 0) { + getParsingFlags(config).unusedInput.push(skipped); + } + string = string.slice( + string.indexOf(parsedInput) + parsedInput.length + ); + totalParsedInputLength += parsedInput.length; + } + // don't parse if it's not a known token + if (formatTokenFunctions[token]) { + if (parsedInput) { + getParsingFlags(config).empty = false; + } else { + getParsingFlags(config).unusedTokens.push(token); + } + addTimeToArrayFromToken(token, parsedInput, config); + } else if (config._strict && !parsedInput) { + getParsingFlags(config).unusedTokens.push(token); + } + } + + // add remaining unparsed input length to the string + getParsingFlags(config).charsLeftOver = + stringLength - totalParsedInputLength; + if (string.length > 0) { + getParsingFlags(config).unusedInput.push(string); + } + + // clear _12h flag if hour is <= 12 + if ( + config._a[HOUR] <= 12 && + getParsingFlags(config).bigHour === true && + config._a[HOUR] > 0 + ) { + getParsingFlags(config).bigHour = undefined; + } + + getParsingFlags(config).parsedDateParts = config._a.slice(0); + getParsingFlags(config).meridiem = config._meridiem; + // handle meridiem + config._a[HOUR] = meridiemFixWrap( + config._locale, + config._a[HOUR], + config._meridiem + ); + + // handle era + era = getParsingFlags(config).era; + if (era !== null) { + config._a[YEAR] = config._locale.erasConvertYear(era, config._a[YEAR]); + } + + configFromArray(config); + checkOverflow(config); + } + + function meridiemFixWrap(locale, hour, meridiem) { + var isPm; + + if (meridiem == null) { + // nothing to do + return hour; + } + if (locale.meridiemHour != null) { + return locale.meridiemHour(hour, meridiem); + } else if (locale.isPM != null) { + // Fallback + isPm = locale.isPM(meridiem); + if (isPm && hour < 12) { + hour += 12; + } + if (!isPm && hour === 12) { + hour = 0; + } + return hour; + } else { + // this is not supposed to happen + return hour; + } + } + + // date from string and array of format strings + function configFromStringAndArray(config) { + var tempConfig, + bestMoment, + scoreToBeat, + i, + currentScore, + validFormatFound, + bestFormatIsValid = false; + + if (config._f.length === 0) { + getParsingFlags(config).invalidFormat = true; + config._d = new Date(NaN); + return; + } + + for (i = 0; i < config._f.length; i++) { + currentScore = 0; + validFormatFound = false; + tempConfig = copyConfig({}, config); + if (config._useUTC != null) { + tempConfig._useUTC = config._useUTC; + } + tempConfig._f = config._f[i]; + configFromStringAndFormat(tempConfig); + + if (isValid(tempConfig)) { + validFormatFound = true; + } + + // if there is any input that was not parsed add a penalty for that format + currentScore += getParsingFlags(tempConfig).charsLeftOver; + + //or tokens + currentScore += getParsingFlags(tempConfig).unusedTokens.length * 10; + + getParsingFlags(tempConfig).score = currentScore; + + if (!bestFormatIsValid) { + if ( + scoreToBeat == null || + currentScore < scoreToBeat || + validFormatFound + ) { + scoreToBeat = currentScore; + bestMoment = tempConfig; + if (validFormatFound) { + bestFormatIsValid = true; + } + } + } else { + if (currentScore < scoreToBeat) { + scoreToBeat = currentScore; + bestMoment = tempConfig; + } + } + } + + extend(config, bestMoment || tempConfig); + } + + function configFromObject(config) { + if (config._d) { + return; + } + + var i = normalizeObjectUnits(config._i), + dayOrDate = i.day === undefined ? i.date : i.day; + config._a = map( + [i.year, i.month, dayOrDate, i.hour, i.minute, i.second, i.millisecond], + function (obj) { + return obj && parseInt(obj, 10); + } + ); + + configFromArray(config); + } + + function createFromConfig(config) { + var res = new Moment(checkOverflow(prepareConfig(config))); + if (res._nextDay) { + // Adding is smart enough around DST + res.add(1, 'd'); + res._nextDay = undefined; + } + + return res; + } + + function prepareConfig(config) { + var input = config._i, + format = config._f; + + config._locale = config._locale || getLocale(config._l); + + if (input === null || (format === undefined && input === '')) { + return createInvalid({ nullInput: true }); + } + + if (typeof input === 'string') { + config._i = input = config._locale.preparse(input); + } + + if (isMoment(input)) { + return new Moment(checkOverflow(input)); + } else if (isDate(input)) { + config._d = input; + } else if (isArray(format)) { + configFromStringAndArray(config); + } else if (format) { + configFromStringAndFormat(config); + } else { + configFromInput(config); + } + + if (!isValid(config)) { + config._d = null; + } + + return config; + } + + function configFromInput(config) { + var input = config._i; + if (isUndefined(input)) { + config._d = new Date(hooks.now()); + } else if (isDate(input)) { + config._d = new Date(input.valueOf()); + } else if (typeof input === 'string') { + configFromString(config); + } else if (isArray(input)) { + config._a = map(input.slice(0), function (obj) { + return parseInt(obj, 10); + }); + configFromArray(config); + } else if (isObject(input)) { + configFromObject(config); + } else if (isNumber(input)) { + // from milliseconds + config._d = new Date(input); + } else { + hooks.createFromInputFallback(config); + } + } + + function createLocalOrUTC(input, format, locale, strict, isUTC) { + var c = {}; + + if (format === true || format === false) { + strict = format; + format = undefined; + } + + if (locale === true || locale === false) { + strict = locale; + locale = undefined; + } + + if ( + (isObject(input) && isObjectEmpty(input)) || + (isArray(input) && input.length === 0) + ) { + input = undefined; + } + // object construction must be done this way. + // https://github.com/moment/moment/issues/1423 + c._isAMomentObject = true; + c._useUTC = c._isUTC = isUTC; + c._l = locale; + c._i = input; + c._f = format; + c._strict = strict; + + return createFromConfig(c); + } + + function createLocal(input, format, locale, strict) { + return createLocalOrUTC(input, format, locale, strict, false); + } + + var prototypeMin = deprecate( + 'moment().min is deprecated, use moment.max instead. http://momentjs.com/guides/#/warnings/min-max/', + function () { + var other = createLocal.apply(null, arguments); + if (this.isValid() && other.isValid()) { + return other < this ? this : other; + } else { + return createInvalid(); + } + } + ), + prototypeMax = deprecate( + 'moment().max is deprecated, use moment.min instead. http://momentjs.com/guides/#/warnings/min-max/', + function () { + var other = createLocal.apply(null, arguments); + if (this.isValid() && other.isValid()) { + return other > this ? this : other; + } else { + return createInvalid(); + } + } + ); + + // Pick a moment m from moments so that m[fn](other) is true for all + // other. This relies on the function fn to be transitive. + // + // moments should either be an array of moment objects or an array, whose + // first element is an array of moment objects. + function pickBy(fn, moments) { + var res, i; + if (moments.length === 1 && isArray(moments[0])) { + moments = moments[0]; + } + if (!moments.length) { + return createLocal(); + } + res = moments[0]; + for (i = 1; i < moments.length; ++i) { + if (!moments[i].isValid() || moments[i][fn](res)) { + res = moments[i]; + } + } + return res; + } + + // TODO: Use [].sort instead? + function min() { + var args = [].slice.call(arguments, 0); + + return pickBy('isBefore', args); + } + + function max() { + var args = [].slice.call(arguments, 0); + + return pickBy('isAfter', args); + } + + var now = function () { + return Date.now ? Date.now() : +new Date(); + }; + + var ordering = [ + 'year', + 'quarter', + 'month', + 'week', + 'day', + 'hour', + 'minute', + 'second', + 'millisecond', + ]; + + function isDurationValid(m) { + var key, + unitHasDecimal = false, + i; + for (key in m) { + if ( + hasOwnProp(m, key) && + !( + indexOf.call(ordering, key) !== -1 && + (m[key] == null || !isNaN(m[key])) + ) + ) { + return false; + } + } + + for (i = 0; i < ordering.length; ++i) { + if (m[ordering[i]]) { + if (unitHasDecimal) { + return false; // only allow non-integers for smallest unit + } + if (parseFloat(m[ordering[i]]) !== toInt(m[ordering[i]])) { + unitHasDecimal = true; + } + } + } + + return true; + } + + function isValid$1() { + return this._isValid; + } + + function createInvalid$1() { + return createDuration(NaN); + } + + function Duration(duration) { + var normalizedInput = normalizeObjectUnits(duration), + years = normalizedInput.year || 0, + quarters = normalizedInput.quarter || 0, + months = normalizedInput.month || 0, + weeks = normalizedInput.week || normalizedInput.isoWeek || 0, + days = normalizedInput.day || 0, + hours = normalizedInput.hour || 0, + minutes = normalizedInput.minute || 0, + seconds = normalizedInput.second || 0, + milliseconds = normalizedInput.millisecond || 0; + + this._isValid = isDurationValid(normalizedInput); + + // representation for dateAddRemove + this._milliseconds = + +milliseconds + + seconds * 1e3 + // 1000 + minutes * 6e4 + // 1000 * 60 + hours * 1000 * 60 * 60; //using 1000 * 60 * 60 instead of 36e5 to avoid floating point rounding errors https://github.com/moment/moment/issues/2978 + // Because of dateAddRemove treats 24 hours as different from a + // day when working around DST, we need to store them separately + this._days = +days + weeks * 7; + // It is impossible to translate months into days without knowing + // which months you are are talking about, so we have to store + // it separately. + this._months = +months + quarters * 3 + years * 12; + + this._data = {}; + + this._locale = getLocale(); + + this._bubble(); + } + + function isDuration(obj) { + return obj instanceof Duration; + } + + function absRound(number) { + if (number < 0) { + return Math.round(-1 * number) * -1; + } else { + return Math.round(number); + } + } + + // compare two arrays, return the number of differences + function compareArrays(array1, array2, dontConvert) { + var len = Math.min(array1.length, array2.length), + lengthDiff = Math.abs(array1.length - array2.length), + diffs = 0, + i; + for (i = 0; i < len; i++) { + if ( + (dontConvert && array1[i] !== array2[i]) || + (!dontConvert && toInt(array1[i]) !== toInt(array2[i])) + ) { + diffs++; + } + } + return diffs + lengthDiff; + } + + // FORMATTING + + function offset(token, separator) { + addFormatToken(token, 0, 0, function () { + var offset = this.utcOffset(), + sign = '+'; + if (offset < 0) { + offset = -offset; + sign = '-'; + } + return ( + sign + + zeroFill(~~(offset / 60), 2) + + separator + + zeroFill(~~offset % 60, 2) + ); + }); + } + + offset('Z', ':'); + offset('ZZ', ''); + + // PARSING + + addRegexToken('Z', matchShortOffset); + addRegexToken('ZZ', matchShortOffset); + addParseToken(['Z', 'ZZ'], function (input, array, config) { + config._useUTC = true; + config._tzm = offsetFromString(matchShortOffset, input); + }); + + // HELPERS + + // timezone chunker + // '+10:00' > ['10', '00'] + // '-1530' > ['-15', '30'] + var chunkOffset = /([\+\-]|\d\d)/gi; + + function offsetFromString(matcher, string) { + var matches = (string || '').match(matcher), + chunk, + parts, + minutes; + + if (matches === null) { + return null; + } + + chunk = matches[matches.length - 1] || []; + parts = (chunk + '').match(chunkOffset) || ['-', 0, 0]; + minutes = +(parts[1] * 60) + toInt(parts[2]); + + return minutes === 0 ? 0 : parts[0] === '+' ? minutes : -minutes; + } + + // Return a moment from input, that is local/utc/zone equivalent to model. + function cloneWithOffset(input, model) { + var res, diff; + if (model._isUTC) { + res = model.clone(); + diff = + (isMoment(input) || isDate(input) + ? input.valueOf() + : createLocal(input).valueOf()) - res.valueOf(); + // Use low-level api, because this fn is low-level api. + res._d.setTime(res._d.valueOf() + diff); + hooks.updateOffset(res, false); + return res; + } else { + return createLocal(input).local(); + } + } + + function getDateOffset(m) { + // On Firefox.24 Date#getTimezoneOffset returns a floating point. + // https://github.com/moment/moment/pull/1871 + return -Math.round(m._d.getTimezoneOffset()); + } + + // HOOKS + + // This function will be called whenever a moment is mutated. + // It is intended to keep the offset in sync with the timezone. + hooks.updateOffset = function () {}; + + // MOMENTS + + // keepLocalTime = true means only change the timezone, without + // affecting the local hour. So 5:31:26 +0300 --[utcOffset(2, true)]--> + // 5:31:26 +0200 It is possible that 5:31:26 doesn't exist with offset + // +0200, so we adjust the time as needed, to be valid. + // + // Keeping the time actually adds/subtracts (one hour) + // from the actual represented time. That is why we call updateOffset + // a second time. In case it wants us to change the offset again + // _changeInProgress == true case, then we have to adjust, because + // there is no such time in the given timezone. + function getSetOffset(input, keepLocalTime, keepMinutes) { + var offset = this._offset || 0, + localAdjust; + if (!this.isValid()) { + return input != null ? this : NaN; + } + if (input != null) { + if (typeof input === 'string') { + input = offsetFromString(matchShortOffset, input); + if (input === null) { + return this; + } + } else if (Math.abs(input) < 16 && !keepMinutes) { + input = input * 60; + } + if (!this._isUTC && keepLocalTime) { + localAdjust = getDateOffset(this); + } + this._offset = input; + this._isUTC = true; + if (localAdjust != null) { + this.add(localAdjust, 'm'); + } + if (offset !== input) { + if (!keepLocalTime || this._changeInProgress) { + addSubtract( + this, + createDuration(input - offset, 'm'), + 1, + false + ); + } else if (!this._changeInProgress) { + this._changeInProgress = true; + hooks.updateOffset(this, true); + this._changeInProgress = null; + } + } + return this; + } else { + return this._isUTC ? offset : getDateOffset(this); + } + } + + function getSetZone(input, keepLocalTime) { + if (input != null) { + if (typeof input !== 'string') { + input = -input; + } + + this.utcOffset(input, keepLocalTime); + + return this; + } else { + return -this.utcOffset(); + } + } + + function setOffsetToUTC(keepLocalTime) { + return this.utcOffset(0, keepLocalTime); + } + + function setOffsetToLocal(keepLocalTime) { + if (this._isUTC) { + this.utcOffset(0, keepLocalTime); + this._isUTC = false; + + if (keepLocalTime) { + this.subtract(getDateOffset(this), 'm'); + } + } + return this; + } + + function setOffsetToParsedOffset() { + if (this._tzm != null) { + this.utcOffset(this._tzm, false, true); + } else if (typeof this._i === 'string') { + var tZone = offsetFromString(matchOffset, this._i); + if (tZone != null) { + this.utcOffset(tZone); + } else { + this.utcOffset(0, true); + } + } + return this; + } + + function hasAlignedHourOffset(input) { + if (!this.isValid()) { + return false; + } + input = input ? createLocal(input).utcOffset() : 0; + + return (this.utcOffset() - input) % 60 === 0; + } + + function isDaylightSavingTime() { + return ( + this.utcOffset() > this.clone().month(0).utcOffset() || + this.utcOffset() > this.clone().month(5).utcOffset() + ); + } + + function isDaylightSavingTimeShifted() { + if (!isUndefined(this._isDSTShifted)) { + return this._isDSTShifted; + } + + var c = {}, + other; + + copyConfig(c, this); + c = prepareConfig(c); + + if (c._a) { + other = c._isUTC ? createUTC(c._a) : createLocal(c._a); + this._isDSTShifted = + this.isValid() && compareArrays(c._a, other.toArray()) > 0; + } else { + this._isDSTShifted = false; + } + + return this._isDSTShifted; + } + + function isLocal() { + return this.isValid() ? !this._isUTC : false; + } + + function isUtcOffset() { + return this.isValid() ? this._isUTC : false; + } + + function isUtc() { + return this.isValid() ? this._isUTC && this._offset === 0 : false; + } + + // ASP.NET json date format regex + var aspNetRegex = /^(-|\+)?(?:(\d*)[. ])?(\d+):(\d+)(?::(\d+)(\.\d*)?)?$/, + // from http://docs.closure-library.googlecode.com/git/closure_goog_date_date.js.source.html + // somewhat more in line with 4.4.3.2 2004 spec, but allows decimal anywhere + // and further modified to allow for strings containing both week and day + isoRegex = /^(-|\+)?P(?:([-+]?[0-9,.]*)Y)?(?:([-+]?[0-9,.]*)M)?(?:([-+]?[0-9,.]*)W)?(?:([-+]?[0-9,.]*)D)?(?:T(?:([-+]?[0-9,.]*)H)?(?:([-+]?[0-9,.]*)M)?(?:([-+]?[0-9,.]*)S)?)?$/; + + function createDuration(input, key) { + var duration = input, + // matching against regexp is expensive, do it on demand + match = null, + sign, + ret, + diffRes; + + if (isDuration(input)) { + duration = { + ms: input._milliseconds, + d: input._days, + M: input._months, + }; + } else if (isNumber(input) || !isNaN(+input)) { + duration = {}; + if (key) { + duration[key] = +input; + } else { + duration.milliseconds = +input; + } + } else if ((match = aspNetRegex.exec(input))) { + sign = match[1] === '-' ? -1 : 1; + duration = { + y: 0, + d: toInt(match[DATE]) * sign, + h: toInt(match[HOUR]) * sign, + m: toInt(match[MINUTE]) * sign, + s: toInt(match[SECOND]) * sign, + ms: toInt(absRound(match[MILLISECOND] * 1000)) * sign, // the millisecond decimal point is included in the match + }; + } else if ((match = isoRegex.exec(input))) { + sign = match[1] === '-' ? -1 : 1; + duration = { + y: parseIso(match[2], sign), + M: parseIso(match[3], sign), + w: parseIso(match[4], sign), + d: parseIso(match[5], sign), + h: parseIso(match[6], sign), + m: parseIso(match[7], sign), + s: parseIso(match[8], sign), + }; + } else if (duration == null) { + // checks for null or undefined + duration = {}; + } else if ( + typeof duration === 'object' && + ('from' in duration || 'to' in duration) + ) { + diffRes = momentsDifference( + createLocal(duration.from), + createLocal(duration.to) + ); + + duration = {}; + duration.ms = diffRes.milliseconds; + duration.M = diffRes.months; + } + + ret = new Duration(duration); + + if (isDuration(input) && hasOwnProp(input, '_locale')) { + ret._locale = input._locale; + } + + if (isDuration(input) && hasOwnProp(input, '_isValid')) { + ret._isValid = input._isValid; + } + + return ret; + } + + createDuration.fn = Duration.prototype; + createDuration.invalid = createInvalid$1; + + function parseIso(inp, sign) { + // We'd normally use ~~inp for this, but unfortunately it also + // converts floats to ints. + // inp may be undefined, so careful calling replace on it. + var res = inp && parseFloat(inp.replace(',', '.')); + // apply sign while we're at it + return (isNaN(res) ? 0 : res) * sign; + } + + function positiveMomentsDifference(base, other) { + var res = {}; + + res.months = + other.month() - base.month() + (other.year() - base.year()) * 12; + if (base.clone().add(res.months, 'M').isAfter(other)) { + --res.months; + } + + res.milliseconds = +other - +base.clone().add(res.months, 'M'); + + return res; + } + + function momentsDifference(base, other) { + var res; + if (!(base.isValid() && other.isValid())) { + return { milliseconds: 0, months: 0 }; + } + + other = cloneWithOffset(other, base); + if (base.isBefore(other)) { + res = positiveMomentsDifference(base, other); + } else { + res = positiveMomentsDifference(other, base); + res.milliseconds = -res.milliseconds; + res.months = -res.months; + } + + return res; + } + + // TODO: remove 'name' arg after deprecation is removed + function createAdder(direction, name) { + return function (val, period) { + var dur, tmp; + //invert the arguments, but complain about it + if (period !== null && !isNaN(+period)) { + deprecateSimple( + name, + 'moment().' + + name + + '(period, number) is deprecated. Please use moment().' + + name + + '(number, period). ' + + 'See http://momentjs.com/guides/#/warnings/add-inverted-param/ for more info.' + ); + tmp = val; + val = period; + period = tmp; + } + + dur = createDuration(val, period); + addSubtract(this, dur, direction); + return this; + }; + } + + function addSubtract(mom, duration, isAdding, updateOffset) { + var milliseconds = duration._milliseconds, + days = absRound(duration._days), + months = absRound(duration._months); + + if (!mom.isValid()) { + // No op + return; + } + + updateOffset = updateOffset == null ? true : updateOffset; + + if (months) { + setMonth(mom, get(mom, 'Month') + months * isAdding); + } + if (days) { + set$1(mom, 'Date', get(mom, 'Date') + days * isAdding); + } + if (milliseconds) { + mom._d.setTime(mom._d.valueOf() + milliseconds * isAdding); + } + if (updateOffset) { + hooks.updateOffset(mom, days || months); + } + } + + var add = createAdder(1, 'add'), + subtract = createAdder(-1, 'subtract'); + + function isString(input) { + return typeof input === 'string' || input instanceof String; + } + + // type MomentInput = Moment | Date | string | number | (number | string)[] | MomentInputObject | void; // null | undefined + function isMomentInput(input) { + return ( + isMoment(input) || + isDate(input) || + isString(input) || + isNumber(input) || + isNumberOrStringArray(input) || + isMomentInputObject(input) || + input === null || + input === undefined + ); + } + + function isMomentInputObject(input) { + var objectTest = isObject(input) && !isObjectEmpty(input), + propertyTest = false, + properties = [ + 'years', + 'year', + 'y', + 'months', + 'month', + 'M', + 'days', + 'day', + 'd', + 'dates', + 'date', + 'D', + 'hours', + 'hour', + 'h', + 'minutes', + 'minute', + 'm', + 'seconds', + 'second', + 's', + 'milliseconds', + 'millisecond', + 'ms', + ], + i, + property; + + for (i = 0; i < properties.length; i += 1) { + property = properties[i]; + propertyTest = propertyTest || hasOwnProp(input, property); + } + + return objectTest && propertyTest; + } + + function isNumberOrStringArray(input) { + var arrayTest = isArray(input), + dataTypeTest = false; + if (arrayTest) { + dataTypeTest = + input.filter(function (item) { + return !isNumber(item) && isString(input); + }).length === 0; + } + return arrayTest && dataTypeTest; + } + + function isCalendarSpec(input) { + var objectTest = isObject(input) && !isObjectEmpty(input), + propertyTest = false, + properties = [ + 'sameDay', + 'nextDay', + 'lastDay', + 'nextWeek', + 'lastWeek', + 'sameElse', + ], + i, + property; + + for (i = 0; i < properties.length; i += 1) { + property = properties[i]; + propertyTest = propertyTest || hasOwnProp(input, property); + } + + return objectTest && propertyTest; + } + + function getCalendarFormat(myMoment, now) { + var diff = myMoment.diff(now, 'days', true); + return diff < -6 + ? 'sameElse' + : diff < -1 + ? 'lastWeek' + : diff < 0 + ? 'lastDay' + : diff < 1 + ? 'sameDay' + : diff < 2 + ? 'nextDay' + : diff < 7 + ? 'nextWeek' + : 'sameElse'; + } + + function calendar$1(time, formats) { + // Support for single parameter, formats only overload to the calendar function + if (arguments.length === 1) { + if (!arguments[0]) { + time = undefined; + formats = undefined; + } else if (isMomentInput(arguments[0])) { + time = arguments[0]; + formats = undefined; + } else if (isCalendarSpec(arguments[0])) { + formats = arguments[0]; + time = undefined; + } + } + // We want to compare the start of today, vs this. + // Getting start-of-today depends on whether we're local/utc/offset or not. + var now = time || createLocal(), + sod = cloneWithOffset(now, this).startOf('day'), + format = hooks.calendarFormat(this, sod) || 'sameElse', + output = + formats && + (isFunction(formats[format]) + ? formats[format].call(this, now) + : formats[format]); + + return this.format( + output || this.localeData().calendar(format, this, createLocal(now)) + ); + } + + function clone() { + return new Moment(this); + } + + function isAfter(input, units) { + var localInput = isMoment(input) ? input : createLocal(input); + if (!(this.isValid() && localInput.isValid())) { + return false; + } + units = normalizeUnits(units) || 'millisecond'; + if (units === 'millisecond') { + return this.valueOf() > localInput.valueOf(); + } else { + return localInput.valueOf() < this.clone().startOf(units).valueOf(); + } + } + + function isBefore(input, units) { + var localInput = isMoment(input) ? input : createLocal(input); + if (!(this.isValid() && localInput.isValid())) { + return false; + } + units = normalizeUnits(units) || 'millisecond'; + if (units === 'millisecond') { + return this.valueOf() < localInput.valueOf(); + } else { + return this.clone().endOf(units).valueOf() < localInput.valueOf(); + } + } + + function isBetween(from, to, units, inclusivity) { + var localFrom = isMoment(from) ? from : createLocal(from), + localTo = isMoment(to) ? to : createLocal(to); + if (!(this.isValid() && localFrom.isValid() && localTo.isValid())) { + return false; + } + inclusivity = inclusivity || '()'; + return ( + (inclusivity[0] === '(' + ? this.isAfter(localFrom, units) + : !this.isBefore(localFrom, units)) && + (inclusivity[1] === ')' + ? this.isBefore(localTo, units) + : !this.isAfter(localTo, units)) + ); + } + + function isSame(input, units) { + var localInput = isMoment(input) ? input : createLocal(input), + inputMs; + if (!(this.isValid() && localInput.isValid())) { + return false; + } + units = normalizeUnits(units) || 'millisecond'; + if (units === 'millisecond') { + return this.valueOf() === localInput.valueOf(); + } else { + inputMs = localInput.valueOf(); + return ( + this.clone().startOf(units).valueOf() <= inputMs && + inputMs <= this.clone().endOf(units).valueOf() + ); + } + } + + function isSameOrAfter(input, units) { + return this.isSame(input, units) || this.isAfter(input, units); + } + + function isSameOrBefore(input, units) { + return this.isSame(input, units) || this.isBefore(input, units); + } + + function diff(input, units, asFloat) { + var that, zoneDelta, output; + + if (!this.isValid()) { + return NaN; + } + + that = cloneWithOffset(input, this); + + if (!that.isValid()) { + return NaN; + } + + zoneDelta = (that.utcOffset() - this.utcOffset()) * 6e4; + + units = normalizeUnits(units); + + switch (units) { + case 'year': + output = monthDiff(this, that) / 12; + break; + case 'month': + output = monthDiff(this, that); + break; + case 'quarter': + output = monthDiff(this, that) / 3; + break; + case 'second': + output = (this - that) / 1e3; + break; // 1000 + case 'minute': + output = (this - that) / 6e4; + break; // 1000 * 60 + case 'hour': + output = (this - that) / 36e5; + break; // 1000 * 60 * 60 + case 'day': + output = (this - that - zoneDelta) / 864e5; + break; // 1000 * 60 * 60 * 24, negate dst + case 'week': + output = (this - that - zoneDelta) / 6048e5; + break; // 1000 * 60 * 60 * 24 * 7, negate dst + default: + output = this - that; + } + + return asFloat ? output : absFloor(output); + } + + function monthDiff(a, b) { + if (a.date() < b.date()) { + // end-of-month calculations work correct when the start month has more + // days than the end month. + return -monthDiff(b, a); + } + // difference in months + var wholeMonthDiff = (b.year() - a.year()) * 12 + (b.month() - a.month()), + // b is in (anchor - 1 month, anchor + 1 month) + anchor = a.clone().add(wholeMonthDiff, 'months'), + anchor2, + adjust; + + if (b - anchor < 0) { + anchor2 = a.clone().add(wholeMonthDiff - 1, 'months'); + // linear across the month + adjust = (b - anchor) / (anchor - anchor2); + } else { + anchor2 = a.clone().add(wholeMonthDiff + 1, 'months'); + // linear across the month + adjust = (b - anchor) / (anchor2 - anchor); + } + + //check for negative zero, return zero if negative zero + return -(wholeMonthDiff + adjust) || 0; + } + + hooks.defaultFormat = 'YYYY-MM-DDTHH:mm:ssZ'; + hooks.defaultFormatUtc = 'YYYY-MM-DDTHH:mm:ss[Z]'; + + function toString() { + return this.clone().locale('en').format('ddd MMM DD YYYY HH:mm:ss [GMT]ZZ'); + } + + function toISOString(keepOffset) { + if (!this.isValid()) { + return null; + } + var utc = keepOffset !== true, + m = utc ? this.clone().utc() : this; + if (m.year() < 0 || m.year() > 9999) { + return formatMoment( + m, + utc + ? 'YYYYYY-MM-DD[T]HH:mm:ss.SSS[Z]' + : 'YYYYYY-MM-DD[T]HH:mm:ss.SSSZ' + ); + } + if (isFunction(Date.prototype.toISOString)) { + // native implementation is ~50x faster, use it when we can + if (utc) { + return this.toDate().toISOString(); + } else { + return new Date(this.valueOf() + this.utcOffset() * 60 * 1000) + .toISOString() + .replace('Z', formatMoment(m, 'Z')); + } + } + return formatMoment( + m, + utc ? 'YYYY-MM-DD[T]HH:mm:ss.SSS[Z]' : 'YYYY-MM-DD[T]HH:mm:ss.SSSZ' + ); + } + + /** + * Return a human readable representation of a moment that can + * also be evaluated to get a new moment which is the same + * + * @link https://nodejs.org/dist/latest/docs/api/util.html#util_custom_inspect_function_on_objects + */ + function inspect() { + if (!this.isValid()) { + return 'moment.invalid(/* ' + this._i + ' */)'; + } + var func = 'moment', + zone = '', + prefix, + year, + datetime, + suffix; + if (!this.isLocal()) { + func = this.utcOffset() === 0 ? 'moment.utc' : 'moment.parseZone'; + zone = 'Z'; + } + prefix = '[' + func + '("]'; + year = 0 <= this.year() && this.year() <= 9999 ? 'YYYY' : 'YYYYYY'; + datetime = '-MM-DD[T]HH:mm:ss.SSS'; + suffix = zone + '[")]'; + + return this.format(prefix + year + datetime + suffix); + } + + function format(inputString) { + if (!inputString) { + inputString = this.isUtc() + ? hooks.defaultFormatUtc + : hooks.defaultFormat; + } + var output = formatMoment(this, inputString); + return this.localeData().postformat(output); + } + + function from(time, withoutSuffix) { + if ( + this.isValid() && + ((isMoment(time) && time.isValid()) || createLocal(time).isValid()) + ) { + return createDuration({ to: this, from: time }) + .locale(this.locale()) + .humanize(!withoutSuffix); + } else { + return this.localeData().invalidDate(); + } + } + + function fromNow(withoutSuffix) { + return this.from(createLocal(), withoutSuffix); + } + + function to(time, withoutSuffix) { + if ( + this.isValid() && + ((isMoment(time) && time.isValid()) || createLocal(time).isValid()) + ) { + return createDuration({ from: this, to: time }) + .locale(this.locale()) + .humanize(!withoutSuffix); + } else { + return this.localeData().invalidDate(); + } + } + + function toNow(withoutSuffix) { + return this.to(createLocal(), withoutSuffix); + } + + // If passed a locale key, it will set the locale for this + // instance. Otherwise, it will return the locale configuration + // variables for this instance. + function locale(key) { + var newLocaleData; + + if (key === undefined) { + return this._locale._abbr; + } else { + newLocaleData = getLocale(key); + if (newLocaleData != null) { + this._locale = newLocaleData; + } + return this; + } + } + + var lang = deprecate( + 'moment().lang() is deprecated. Instead, use moment().localeData() to get the language configuration. Use moment().locale() to change languages.', + function (key) { + if (key === undefined) { + return this.localeData(); + } else { + return this.locale(key); + } + } + ); + + function localeData() { + return this._locale; + } + + var MS_PER_SECOND = 1000, + MS_PER_MINUTE = 60 * MS_PER_SECOND, + MS_PER_HOUR = 60 * MS_PER_MINUTE, + MS_PER_400_YEARS = (365 * 400 + 97) * 24 * MS_PER_HOUR; + + // actual modulo - handles negative numbers (for dates before 1970): + function mod$1(dividend, divisor) { + return ((dividend % divisor) + divisor) % divisor; + } + + function localStartOfDate(y, m, d) { + // the date constructor remaps years 0-99 to 1900-1999 + if (y < 100 && y >= 0) { + // preserve leap years using a full 400 year cycle, then reset + return new Date(y + 400, m, d) - MS_PER_400_YEARS; + } else { + return new Date(y, m, d).valueOf(); + } + } + + function utcStartOfDate(y, m, d) { + // Date.UTC remaps years 0-99 to 1900-1999 + if (y < 100 && y >= 0) { + // preserve leap years using a full 400 year cycle, then reset + return Date.UTC(y + 400, m, d) - MS_PER_400_YEARS; + } else { + return Date.UTC(y, m, d); + } + } + + function startOf(units) { + var time, startOfDate; + units = normalizeUnits(units); + if (units === undefined || units === 'millisecond' || !this.isValid()) { + return this; + } + + startOfDate = this._isUTC ? utcStartOfDate : localStartOfDate; + + switch (units) { + case 'year': + time = startOfDate(this.year(), 0, 1); + break; + case 'quarter': + time = startOfDate( + this.year(), + this.month() - (this.month() % 3), + 1 + ); + break; + case 'month': + time = startOfDate(this.year(), this.month(), 1); + break; + case 'week': + time = startOfDate( + this.year(), + this.month(), + this.date() - this.weekday() + ); + break; + case 'isoWeek': + time = startOfDate( + this.year(), + this.month(), + this.date() - (this.isoWeekday() - 1) + ); + break; + case 'day': + case 'date': + time = startOfDate(this.year(), this.month(), this.date()); + break; + case 'hour': + time = this._d.valueOf(); + time -= mod$1( + time + (this._isUTC ? 0 : this.utcOffset() * MS_PER_MINUTE), + MS_PER_HOUR + ); + break; + case 'minute': + time = this._d.valueOf(); + time -= mod$1(time, MS_PER_MINUTE); + break; + case 'second': + time = this._d.valueOf(); + time -= mod$1(time, MS_PER_SECOND); + break; + } + + this._d.setTime(time); + hooks.updateOffset(this, true); + return this; + } + + function endOf(units) { + var time, startOfDate; + units = normalizeUnits(units); + if (units === undefined || units === 'millisecond' || !this.isValid()) { + return this; + } + + startOfDate = this._isUTC ? utcStartOfDate : localStartOfDate; + + switch (units) { + case 'year': + time = startOfDate(this.year() + 1, 0, 1) - 1; + break; + case 'quarter': + time = + startOfDate( + this.year(), + this.month() - (this.month() % 3) + 3, + 1 + ) - 1; + break; + case 'month': + time = startOfDate(this.year(), this.month() + 1, 1) - 1; + break; + case 'week': + time = + startOfDate( + this.year(), + this.month(), + this.date() - this.weekday() + 7 + ) - 1; + break; + case 'isoWeek': + time = + startOfDate( + this.year(), + this.month(), + this.date() - (this.isoWeekday() - 1) + 7 + ) - 1; + break; + case 'day': + case 'date': + time = startOfDate(this.year(), this.month(), this.date() + 1) - 1; + break; + case 'hour': + time = this._d.valueOf(); + time += + MS_PER_HOUR - + mod$1( + time + (this._isUTC ? 0 : this.utcOffset() * MS_PER_MINUTE), + MS_PER_HOUR + ) - + 1; + break; + case 'minute': + time = this._d.valueOf(); + time += MS_PER_MINUTE - mod$1(time, MS_PER_MINUTE) - 1; + break; + case 'second': + time = this._d.valueOf(); + time += MS_PER_SECOND - mod$1(time, MS_PER_SECOND) - 1; + break; + } + + this._d.setTime(time); + hooks.updateOffset(this, true); + return this; + } + + function valueOf() { + return this._d.valueOf() - (this._offset || 0) * 60000; + } + + function unix() { + return Math.floor(this.valueOf() / 1000); + } + + function toDate() { + return new Date(this.valueOf()); + } + + function toArray() { + var m = this; + return [ + m.year(), + m.month(), + m.date(), + m.hour(), + m.minute(), + m.second(), + m.millisecond(), + ]; + } + + function toObject() { + var m = this; + return { + years: m.year(), + months: m.month(), + date: m.date(), + hours: m.hours(), + minutes: m.minutes(), + seconds: m.seconds(), + milliseconds: m.milliseconds(), + }; + } + + function toJSON() { + // new Date(NaN).toJSON() === null + return this.isValid() ? this.toISOString() : null; + } + + function isValid$2() { + return isValid(this); + } + + function parsingFlags() { + return extend({}, getParsingFlags(this)); + } + + function invalidAt() { + return getParsingFlags(this).overflow; + } + + function creationData() { + return { + input: this._i, + format: this._f, + locale: this._locale, + isUTC: this._isUTC, + strict: this._strict, + }; + } + + addFormatToken('N', 0, 0, 'eraAbbr'); + addFormatToken('NN', 0, 0, 'eraAbbr'); + addFormatToken('NNN', 0, 0, 'eraAbbr'); + addFormatToken('NNNN', 0, 0, 'eraName'); + addFormatToken('NNNNN', 0, 0, 'eraNarrow'); + + addFormatToken('y', ['y', 1], 'yo', 'eraYear'); + addFormatToken('y', ['yy', 2], 0, 'eraYear'); + addFormatToken('y', ['yyy', 3], 0, 'eraYear'); + addFormatToken('y', ['yyyy', 4], 0, 'eraYear'); + + addRegexToken('N', matchEraAbbr); + addRegexToken('NN', matchEraAbbr); + addRegexToken('NNN', matchEraAbbr); + addRegexToken('NNNN', matchEraName); + addRegexToken('NNNNN', matchEraNarrow); + + addParseToken(['N', 'NN', 'NNN', 'NNNN', 'NNNNN'], function ( + input, + array, + config, + token + ) { + var era = config._locale.erasParse(input, token, config._strict); + if (era) { + getParsingFlags(config).era = era; + } else { + getParsingFlags(config).invalidEra = input; + } + }); + + addRegexToken('y', matchUnsigned); + addRegexToken('yy', matchUnsigned); + addRegexToken('yyy', matchUnsigned); + addRegexToken('yyyy', matchUnsigned); + addRegexToken('yo', matchEraYearOrdinal); + + addParseToken(['y', 'yy', 'yyy', 'yyyy'], YEAR); + addParseToken(['yo'], function (input, array, config, token) { + var match; + if (config._locale._eraYearOrdinalRegex) { + match = input.match(config._locale._eraYearOrdinalRegex); + } + + if (config._locale.eraYearOrdinalParse) { + array[YEAR] = config._locale.eraYearOrdinalParse(input, match); + } else { + array[YEAR] = parseInt(input, 10); + } + }); + + function localeEras(m, format) { + var i, + l, + date, + eras = this._eras || getLocale('en')._eras; + for (i = 0, l = eras.length; i < l; ++i) { + switch (typeof eras[i].since) { + case 'string': + // truncate time + date = hooks(eras[i].since).startOf('day'); + eras[i].since = date.valueOf(); + break; + } + + switch (typeof eras[i].until) { + case 'undefined': + eras[i].until = +Infinity; + break; + case 'string': + // truncate time + date = hooks(eras[i].until).startOf('day').valueOf(); + eras[i].until = date.valueOf(); + break; + } + } + return eras; + } + + function localeErasParse(eraName, format, strict) { + var i, + l, + eras = this.eras(), + name, + abbr, + narrow; + eraName = eraName.toUpperCase(); + + for (i = 0, l = eras.length; i < l; ++i) { + name = eras[i].name.toUpperCase(); + abbr = eras[i].abbr.toUpperCase(); + narrow = eras[i].narrow.toUpperCase(); + + if (strict) { + switch (format) { + case 'N': + case 'NN': + case 'NNN': + if (abbr === eraName) { + return eras[i]; + } + break; + + case 'NNNN': + if (name === eraName) { + return eras[i]; + } + break; + + case 'NNNNN': + if (narrow === eraName) { + return eras[i]; + } + break; + } + } else if ([name, abbr, narrow].indexOf(eraName) >= 0) { + return eras[i]; + } + } + } + + function localeErasConvertYear(era, year) { + var dir = era.since <= era.until ? +1 : -1; + if (year === undefined) { + return hooks(era.since).year(); + } else { + return hooks(era.since).year() + (year - era.offset) * dir; + } + } + + function getEraName() { + var i, + l, + val, + eras = this.localeData().eras(); + for (i = 0, l = eras.length; i < l; ++i) { + // truncate time + val = this.clone().startOf('day').valueOf(); + + if (eras[i].since <= val && val <= eras[i].until) { + return eras[i].name; + } + if (eras[i].until <= val && val <= eras[i].since) { + return eras[i].name; + } + } + + return ''; + } + + function getEraNarrow() { + var i, + l, + val, + eras = this.localeData().eras(); + for (i = 0, l = eras.length; i < l; ++i) { + // truncate time + val = this.clone().startOf('day').valueOf(); + + if (eras[i].since <= val && val <= eras[i].until) { + return eras[i].narrow; + } + if (eras[i].until <= val && val <= eras[i].since) { + return eras[i].narrow; + } + } + + return ''; + } + + function getEraAbbr() { + var i, + l, + val, + eras = this.localeData().eras(); + for (i = 0, l = eras.length; i < l; ++i) { + // truncate time + val = this.clone().startOf('day').valueOf(); + + if (eras[i].since <= val && val <= eras[i].until) { + return eras[i].abbr; + } + if (eras[i].until <= val && val <= eras[i].since) { + return eras[i].abbr; + } + } + + return ''; + } + + function getEraYear() { + var i, + l, + dir, + val, + eras = this.localeData().eras(); + for (i = 0, l = eras.length; i < l; ++i) { + dir = eras[i].since <= eras[i].until ? +1 : -1; + + // truncate time + val = this.clone().startOf('day').valueOf(); + + if ( + (eras[i].since <= val && val <= eras[i].until) || + (eras[i].until <= val && val <= eras[i].since) + ) { + return ( + (this.year() - hooks(eras[i].since).year()) * dir + + eras[i].offset + ); + } + } + + return this.year(); + } + + function erasNameRegex(isStrict) { + if (!hasOwnProp(this, '_erasNameRegex')) { + computeErasParse.call(this); + } + return isStrict ? this._erasNameRegex : this._erasRegex; + } + + function erasAbbrRegex(isStrict) { + if (!hasOwnProp(this, '_erasAbbrRegex')) { + computeErasParse.call(this); + } + return isStrict ? this._erasAbbrRegex : this._erasRegex; + } + + function erasNarrowRegex(isStrict) { + if (!hasOwnProp(this, '_erasNarrowRegex')) { + computeErasParse.call(this); + } + return isStrict ? this._erasNarrowRegex : this._erasRegex; + } + + function matchEraAbbr(isStrict, locale) { + return locale.erasAbbrRegex(isStrict); + } + + function matchEraName(isStrict, locale) { + return locale.erasNameRegex(isStrict); + } + + function matchEraNarrow(isStrict, locale) { + return locale.erasNarrowRegex(isStrict); + } + + function matchEraYearOrdinal(isStrict, locale) { + return locale._eraYearOrdinalRegex || matchUnsigned; + } + + function computeErasParse() { + var abbrPieces = [], + namePieces = [], + narrowPieces = [], + mixedPieces = [], + i, + l, + eras = this.eras(); + + for (i = 0, l = eras.length; i < l; ++i) { + namePieces.push(regexEscape(eras[i].name)); + abbrPieces.push(regexEscape(eras[i].abbr)); + narrowPieces.push(regexEscape(eras[i].narrow)); + + mixedPieces.push(regexEscape(eras[i].name)); + mixedPieces.push(regexEscape(eras[i].abbr)); + mixedPieces.push(regexEscape(eras[i].narrow)); + } + + this._erasRegex = new RegExp('^(' + mixedPieces.join('|') + ')', 'i'); + this._erasNameRegex = new RegExp('^(' + namePieces.join('|') + ')', 'i'); + this._erasAbbrRegex = new RegExp('^(' + abbrPieces.join('|') + ')', 'i'); + this._erasNarrowRegex = new RegExp( + '^(' + narrowPieces.join('|') + ')', + 'i' + ); + } + + // FORMATTING + + addFormatToken(0, ['gg', 2], 0, function () { + return this.weekYear() % 100; + }); + + addFormatToken(0, ['GG', 2], 0, function () { + return this.isoWeekYear() % 100; + }); + + function addWeekYearFormatToken(token, getter) { + addFormatToken(0, [token, token.length], 0, getter); + } + + addWeekYearFormatToken('gggg', 'weekYear'); + addWeekYearFormatToken('ggggg', 'weekYear'); + addWeekYearFormatToken('GGGG', 'isoWeekYear'); + addWeekYearFormatToken('GGGGG', 'isoWeekYear'); + + // ALIASES + + addUnitAlias('weekYear', 'gg'); + addUnitAlias('isoWeekYear', 'GG'); + + // PRIORITY + + addUnitPriority('weekYear', 1); + addUnitPriority('isoWeekYear', 1); + + // PARSING + + addRegexToken('G', matchSigned); + addRegexToken('g', matchSigned); + addRegexToken('GG', match1to2, match2); + addRegexToken('gg', match1to2, match2); + addRegexToken('GGGG', match1to4, match4); + addRegexToken('gggg', match1to4, match4); + addRegexToken('GGGGG', match1to6, match6); + addRegexToken('ggggg', match1to6, match6); + + addWeekParseToken(['gggg', 'ggggg', 'GGGG', 'GGGGG'], function ( + input, + week, + config, + token + ) { + week[token.substr(0, 2)] = toInt(input); + }); + + addWeekParseToken(['gg', 'GG'], function (input, week, config, token) { + week[token] = hooks.parseTwoDigitYear(input); + }); + + // MOMENTS + + function getSetWeekYear(input) { + return getSetWeekYearHelper.call( + this, + input, + this.week(), + this.weekday(), + this.localeData()._week.dow, + this.localeData()._week.doy + ); + } + + function getSetISOWeekYear(input) { + return getSetWeekYearHelper.call( + this, + input, + this.isoWeek(), + this.isoWeekday(), + 1, + 4 + ); + } + + function getISOWeeksInYear() { + return weeksInYear(this.year(), 1, 4); + } + + function getISOWeeksInISOWeekYear() { + return weeksInYear(this.isoWeekYear(), 1, 4); + } + + function getWeeksInYear() { + var weekInfo = this.localeData()._week; + return weeksInYear(this.year(), weekInfo.dow, weekInfo.doy); + } + + function getWeeksInWeekYear() { + var weekInfo = this.localeData()._week; + return weeksInYear(this.weekYear(), weekInfo.dow, weekInfo.doy); + } + + function getSetWeekYearHelper(input, week, weekday, dow, doy) { + var weeksTarget; + if (input == null) { + return weekOfYear(this, dow, doy).year; + } else { + weeksTarget = weeksInYear(input, dow, doy); + if (week > weeksTarget) { + week = weeksTarget; + } + return setWeekAll.call(this, input, week, weekday, dow, doy); + } + } + + function setWeekAll(weekYear, week, weekday, dow, doy) { + var dayOfYearData = dayOfYearFromWeeks(weekYear, week, weekday, dow, doy), + date = createUTCDate(dayOfYearData.year, 0, dayOfYearData.dayOfYear); + + this.year(date.getUTCFullYear()); + this.month(date.getUTCMonth()); + this.date(date.getUTCDate()); + return this; + } + + // FORMATTING + + addFormatToken('Q', 0, 'Qo', 'quarter'); + + // ALIASES + + addUnitAlias('quarter', 'Q'); + + // PRIORITY + + addUnitPriority('quarter', 7); + + // PARSING + + addRegexToken('Q', match1); + addParseToken('Q', function (input, array) { + array[MONTH] = (toInt(input) - 1) * 3; + }); + + // MOMENTS + + function getSetQuarter(input) { + return input == null + ? Math.ceil((this.month() + 1) / 3) + : this.month((input - 1) * 3 + (this.month() % 3)); + } + + // FORMATTING + + addFormatToken('D', ['DD', 2], 'Do', 'date'); + + // ALIASES + + addUnitAlias('date', 'D'); + + // PRIORITY + addUnitPriority('date', 9); + + // PARSING + + addRegexToken('D', match1to2); + addRegexToken('DD', match1to2, match2); + addRegexToken('Do', function (isStrict, locale) { + // TODO: Remove "ordinalParse" fallback in next major release. + return isStrict + ? locale._dayOfMonthOrdinalParse || locale._ordinalParse + : locale._dayOfMonthOrdinalParseLenient; + }); + + addParseToken(['D', 'DD'], DATE); + addParseToken('Do', function (input, array) { + array[DATE] = toInt(input.match(match1to2)[0]); + }); + + // MOMENTS + + var getSetDayOfMonth = makeGetSet('Date', true); + + // FORMATTING + + addFormatToken('DDD', ['DDDD', 3], 'DDDo', 'dayOfYear'); + + // ALIASES + + addUnitAlias('dayOfYear', 'DDD'); + + // PRIORITY + addUnitPriority('dayOfYear', 4); + + // PARSING + + addRegexToken('DDD', match1to3); + addRegexToken('DDDD', match3); + addParseToken(['DDD', 'DDDD'], function (input, array, config) { + config._dayOfYear = toInt(input); + }); + + // HELPERS + + // MOMENTS + + function getSetDayOfYear(input) { + var dayOfYear = + Math.round( + (this.clone().startOf('day') - this.clone().startOf('year')) / 864e5 + ) + 1; + return input == null ? dayOfYear : this.add(input - dayOfYear, 'd'); + } + + // FORMATTING + + addFormatToken('m', ['mm', 2], 0, 'minute'); + + // ALIASES + + addUnitAlias('minute', 'm'); + + // PRIORITY + + addUnitPriority('minute', 14); + + // PARSING + + addRegexToken('m', match1to2); + addRegexToken('mm', match1to2, match2); + addParseToken(['m', 'mm'], MINUTE); + + // MOMENTS + + var getSetMinute = makeGetSet('Minutes', false); + + // FORMATTING + + addFormatToken('s', ['ss', 2], 0, 'second'); + + // ALIASES + + addUnitAlias('second', 's'); + + // PRIORITY + + addUnitPriority('second', 15); + + // PARSING + + addRegexToken('s', match1to2); + addRegexToken('ss', match1to2, match2); + addParseToken(['s', 'ss'], SECOND); + + // MOMENTS + + var getSetSecond = makeGetSet('Seconds', false); + + // FORMATTING + + addFormatToken('S', 0, 0, function () { + return ~~(this.millisecond() / 100); + }); + + addFormatToken(0, ['SS', 2], 0, function () { + return ~~(this.millisecond() / 10); + }); + + addFormatToken(0, ['SSS', 3], 0, 'millisecond'); + addFormatToken(0, ['SSSS', 4], 0, function () { + return this.millisecond() * 10; + }); + addFormatToken(0, ['SSSSS', 5], 0, function () { + return this.millisecond() * 100; + }); + addFormatToken(0, ['SSSSSS', 6], 0, function () { + return this.millisecond() * 1000; + }); + addFormatToken(0, ['SSSSSSS', 7], 0, function () { + return this.millisecond() * 10000; + }); + addFormatToken(0, ['SSSSSSSS', 8], 0, function () { + return this.millisecond() * 100000; + }); + addFormatToken(0, ['SSSSSSSSS', 9], 0, function () { + return this.millisecond() * 1000000; + }); + + // ALIASES + + addUnitAlias('millisecond', 'ms'); + + // PRIORITY + + addUnitPriority('millisecond', 16); + + // PARSING + + addRegexToken('S', match1to3, match1); + addRegexToken('SS', match1to3, match2); + addRegexToken('SSS', match1to3, match3); + + var token, getSetMillisecond; + for (token = 'SSSS'; token.length <= 9; token += 'S') { + addRegexToken(token, matchUnsigned); + } + + function parseMs(input, array) { + array[MILLISECOND] = toInt(('0.' + input) * 1000); + } + + for (token = 'S'; token.length <= 9; token += 'S') { + addParseToken(token, parseMs); + } + + getSetMillisecond = makeGetSet('Milliseconds', false); + + // FORMATTING + + addFormatToken('z', 0, 0, 'zoneAbbr'); + addFormatToken('zz', 0, 0, 'zoneName'); + + // MOMENTS + + function getZoneAbbr() { + return this._isUTC ? 'UTC' : ''; + } + + function getZoneName() { + return this._isUTC ? 'Coordinated Universal Time' : ''; + } + + var proto = Moment.prototype; + + proto.add = add; + proto.calendar = calendar$1; + proto.clone = clone; + proto.diff = diff; + proto.endOf = endOf; + proto.format = format; + proto.from = from; + proto.fromNow = fromNow; + proto.to = to; + proto.toNow = toNow; + proto.get = stringGet; + proto.invalidAt = invalidAt; + proto.isAfter = isAfter; + proto.isBefore = isBefore; + proto.isBetween = isBetween; + proto.isSame = isSame; + proto.isSameOrAfter = isSameOrAfter; + proto.isSameOrBefore = isSameOrBefore; + proto.isValid = isValid$2; + proto.lang = lang; + proto.locale = locale; + proto.localeData = localeData; + proto.max = prototypeMax; + proto.min = prototypeMin; + proto.parsingFlags = parsingFlags; + proto.set = stringSet; + proto.startOf = startOf; + proto.subtract = subtract; + proto.toArray = toArray; + proto.toObject = toObject; + proto.toDate = toDate; + proto.toISOString = toISOString; + proto.inspect = inspect; + if (typeof Symbol !== 'undefined' && Symbol.for != null) { + proto[Symbol.for('nodejs.util.inspect.custom')] = function () { + return 'Moment<' + this.format() + '>'; + }; + } + proto.toJSON = toJSON; + proto.toString = toString; + proto.unix = unix; + proto.valueOf = valueOf; + proto.creationData = creationData; + proto.eraName = getEraName; + proto.eraNarrow = getEraNarrow; + proto.eraAbbr = getEraAbbr; + proto.eraYear = getEraYear; + proto.year = getSetYear; + proto.isLeapYear = getIsLeapYear; + proto.weekYear = getSetWeekYear; + proto.isoWeekYear = getSetISOWeekYear; + proto.quarter = proto.quarters = getSetQuarter; + proto.month = getSetMonth; + proto.daysInMonth = getDaysInMonth; + proto.week = proto.weeks = getSetWeek; + proto.isoWeek = proto.isoWeeks = getSetISOWeek; + proto.weeksInYear = getWeeksInYear; + proto.weeksInWeekYear = getWeeksInWeekYear; + proto.isoWeeksInYear = getISOWeeksInYear; + proto.isoWeeksInISOWeekYear = getISOWeeksInISOWeekYear; + proto.date = getSetDayOfMonth; + proto.day = proto.days = getSetDayOfWeek; + proto.weekday = getSetLocaleDayOfWeek; + proto.isoWeekday = getSetISODayOfWeek; + proto.dayOfYear = getSetDayOfYear; + proto.hour = proto.hours = getSetHour; + proto.minute = proto.minutes = getSetMinute; + proto.second = proto.seconds = getSetSecond; + proto.millisecond = proto.milliseconds = getSetMillisecond; + proto.utcOffset = getSetOffset; + proto.utc = setOffsetToUTC; + proto.local = setOffsetToLocal; + proto.parseZone = setOffsetToParsedOffset; + proto.hasAlignedHourOffset = hasAlignedHourOffset; + proto.isDST = isDaylightSavingTime; + proto.isLocal = isLocal; + proto.isUtcOffset = isUtcOffset; + proto.isUtc = isUtc; + proto.isUTC = isUtc; + proto.zoneAbbr = getZoneAbbr; + proto.zoneName = getZoneName; + proto.dates = deprecate( + 'dates accessor is deprecated. Use date instead.', + getSetDayOfMonth + ); + proto.months = deprecate( + 'months accessor is deprecated. Use month instead', + getSetMonth + ); + proto.years = deprecate( + 'years accessor is deprecated. Use year instead', + getSetYear + ); + proto.zone = deprecate( + 'moment().zone is deprecated, use moment().utcOffset instead. http://momentjs.com/guides/#/warnings/zone/', + getSetZone + ); + proto.isDSTShifted = deprecate( + 'isDSTShifted is deprecated. See http://momentjs.com/guides/#/warnings/dst-shifted/ for more information', + isDaylightSavingTimeShifted + ); + + function createUnix(input) { + return createLocal(input * 1000); + } + + function createInZone() { + return createLocal.apply(null, arguments).parseZone(); + } + + function preParsePostFormat(string) { + return string; + } + + var proto$1 = Locale.prototype; + + proto$1.calendar = calendar; + proto$1.longDateFormat = longDateFormat; + proto$1.invalidDate = invalidDate; + proto$1.ordinal = ordinal; + proto$1.preparse = preParsePostFormat; + proto$1.postformat = preParsePostFormat; + proto$1.relativeTime = relativeTime; + proto$1.pastFuture = pastFuture; + proto$1.set = set; + proto$1.eras = localeEras; + proto$1.erasParse = localeErasParse; + proto$1.erasConvertYear = localeErasConvertYear; + proto$1.erasAbbrRegex = erasAbbrRegex; + proto$1.erasNameRegex = erasNameRegex; + proto$1.erasNarrowRegex = erasNarrowRegex; + + proto$1.months = localeMonths; + proto$1.monthsShort = localeMonthsShort; + proto$1.monthsParse = localeMonthsParse; + proto$1.monthsRegex = monthsRegex; + proto$1.monthsShortRegex = monthsShortRegex; + proto$1.week = localeWeek; + proto$1.firstDayOfYear = localeFirstDayOfYear; + proto$1.firstDayOfWeek = localeFirstDayOfWeek; + + proto$1.weekdays = localeWeekdays; + proto$1.weekdaysMin = localeWeekdaysMin; + proto$1.weekdaysShort = localeWeekdaysShort; + proto$1.weekdaysParse = localeWeekdaysParse; + + proto$1.weekdaysRegex = weekdaysRegex; + proto$1.weekdaysShortRegex = weekdaysShortRegex; + proto$1.weekdaysMinRegex = weekdaysMinRegex; + + proto$1.isPM = localeIsPM; + proto$1.meridiem = localeMeridiem; + + function get$1(format, index, field, setter) { + var locale = getLocale(), + utc = createUTC().set(setter, index); + return locale[field](utc, format); + } + + function listMonthsImpl(format, index, field) { + if (isNumber(format)) { + index = format; + format = undefined; + } + + format = format || ''; + + if (index != null) { + return get$1(format, index, field, 'month'); + } + + var i, + out = []; + for (i = 0; i < 12; i++) { + out[i] = get$1(format, i, field, 'month'); + } + return out; + } + + // () + // (5) + // (fmt, 5) + // (fmt) + // (true) + // (true, 5) + // (true, fmt, 5) + // (true, fmt) + function listWeekdaysImpl(localeSorted, format, index, field) { + if (typeof localeSorted === 'boolean') { + if (isNumber(format)) { + index = format; + format = undefined; + } + + format = format || ''; + } else { + format = localeSorted; + index = format; + localeSorted = false; + + if (isNumber(format)) { + index = format; + format = undefined; + } + + format = format || ''; + } + + var locale = getLocale(), + shift = localeSorted ? locale._week.dow : 0, + i, + out = []; + + if (index != null) { + return get$1(format, (index + shift) % 7, field, 'day'); + } + + for (i = 0; i < 7; i++) { + out[i] = get$1(format, (i + shift) % 7, field, 'day'); + } + return out; + } + + function listMonths(format, index) { + return listMonthsImpl(format, index, 'months'); + } + + function listMonthsShort(format, index) { + return listMonthsImpl(format, index, 'monthsShort'); + } + + function listWeekdays(localeSorted, format, index) { + return listWeekdaysImpl(localeSorted, format, index, 'weekdays'); + } + + function listWeekdaysShort(localeSorted, format, index) { + return listWeekdaysImpl(localeSorted, format, index, 'weekdaysShort'); + } + + function listWeekdaysMin(localeSorted, format, index) { + return listWeekdaysImpl(localeSorted, format, index, 'weekdaysMin'); + } + + getSetGlobalLocale('en', { + eras: [ + { + since: '0001-01-01', + until: +Infinity, + offset: 1, + name: 'Anno Domini', + narrow: 'AD', + abbr: 'AD', + }, + { + since: '0000-12-31', + until: -Infinity, + offset: 1, + name: 'Before Christ', + narrow: 'BC', + abbr: 'BC', + }, + ], + dayOfMonthOrdinalParse: /\d{1,2}(th|st|nd|rd)/, + ordinal: function (number) { + var b = number % 10, + output = + toInt((number % 100) / 10) === 1 + ? 'th' + : b === 1 + ? 'st' + : b === 2 + ? 'nd' + : b === 3 + ? 'rd' + : 'th'; + return number + output; + }, + }); + + // Side effect imports + + hooks.lang = deprecate( + 'moment.lang is deprecated. Use moment.locale instead.', + getSetGlobalLocale + ); + hooks.langData = deprecate( + 'moment.langData is deprecated. Use moment.localeData instead.', + getLocale + ); + + var mathAbs = Math.abs; + + function abs() { + var data = this._data; + + this._milliseconds = mathAbs(this._milliseconds); + this._days = mathAbs(this._days); + this._months = mathAbs(this._months); + + data.milliseconds = mathAbs(data.milliseconds); + data.seconds = mathAbs(data.seconds); + data.minutes = mathAbs(data.minutes); + data.hours = mathAbs(data.hours); + data.months = mathAbs(data.months); + data.years = mathAbs(data.years); + + return this; + } + + function addSubtract$1(duration, input, value, direction) { + var other = createDuration(input, value); + + duration._milliseconds += direction * other._milliseconds; + duration._days += direction * other._days; + duration._months += direction * other._months; + + return duration._bubble(); + } + + // supports only 2.0-style add(1, 's') or add(duration) + function add$1(input, value) { + return addSubtract$1(this, input, value, 1); + } + + // supports only 2.0-style subtract(1, 's') or subtract(duration) + function subtract$1(input, value) { + return addSubtract$1(this, input, value, -1); + } + + function absCeil(number) { + if (number < 0) { + return Math.floor(number); + } else { + return Math.ceil(number); + } + } + + function bubble() { + var milliseconds = this._milliseconds, + days = this._days, + months = this._months, + data = this._data, + seconds, + minutes, + hours, + years, + monthsFromDays; + + // if we have a mix of positive and negative values, bubble down first + // check: https://github.com/moment/moment/issues/2166 + if ( + !( + (milliseconds >= 0 && days >= 0 && months >= 0) || + (milliseconds <= 0 && days <= 0 && months <= 0) + ) + ) { + milliseconds += absCeil(monthsToDays(months) + days) * 864e5; + days = 0; + months = 0; + } + + // The following code bubbles up values, see the tests for + // examples of what that means. + data.milliseconds = milliseconds % 1000; + + seconds = absFloor(milliseconds / 1000); + data.seconds = seconds % 60; + + minutes = absFloor(seconds / 60); + data.minutes = minutes % 60; + + hours = absFloor(minutes / 60); + data.hours = hours % 24; + + days += absFloor(hours / 24); + + // convert days to months + monthsFromDays = absFloor(daysToMonths(days)); + months += monthsFromDays; + days -= absCeil(monthsToDays(monthsFromDays)); + + // 12 months -> 1 year + years = absFloor(months / 12); + months %= 12; + + data.days = days; + data.months = months; + data.years = years; + + return this; + } + + function daysToMonths(days) { + // 400 years have 146097 days (taking into account leap year rules) + // 400 years have 12 months === 4800 + return (days * 4800) / 146097; + } + + function monthsToDays(months) { + // the reverse of daysToMonths + return (months * 146097) / 4800; + } + + function as(units) { + if (!this.isValid()) { + return NaN; + } + var days, + months, + milliseconds = this._milliseconds; + + units = normalizeUnits(units); + + if (units === 'month' || units === 'quarter' || units === 'year') { + days = this._days + milliseconds / 864e5; + months = this._months + daysToMonths(days); + switch (units) { + case 'month': + return months; + case 'quarter': + return months / 3; + case 'year': + return months / 12; + } + } else { + // handle milliseconds separately because of floating point math errors (issue #1867) + days = this._days + Math.round(monthsToDays(this._months)); + switch (units) { + case 'week': + return days / 7 + milliseconds / 6048e5; + case 'day': + return days + milliseconds / 864e5; + case 'hour': + return days * 24 + milliseconds / 36e5; + case 'minute': + return days * 1440 + milliseconds / 6e4; + case 'second': + return days * 86400 + milliseconds / 1000; + // Math.floor prevents floating point math errors here + case 'millisecond': + return Math.floor(days * 864e5) + milliseconds; + default: + throw new Error('Unknown unit ' + units); + } + } + } + + // TODO: Use this.as('ms')? + function valueOf$1() { + if (!this.isValid()) { + return NaN; + } + return ( + this._milliseconds + + this._days * 864e5 + + (this._months % 12) * 2592e6 + + toInt(this._months / 12) * 31536e6 + ); + } + + function makeAs(alias) { + return function () { + return this.as(alias); + }; + } + + var asMilliseconds = makeAs('ms'), + asSeconds = makeAs('s'), + asMinutes = makeAs('m'), + asHours = makeAs('h'), + asDays = makeAs('d'), + asWeeks = makeAs('w'), + asMonths = makeAs('M'), + asQuarters = makeAs('Q'), + asYears = makeAs('y'); + + function clone$1() { + return createDuration(this); + } + + function get$2(units) { + units = normalizeUnits(units); + return this.isValid() ? this[units + 's']() : NaN; + } + + function makeGetter(name) { + return function () { + return this.isValid() ? this._data[name] : NaN; + }; + } + + var milliseconds = makeGetter('milliseconds'), + seconds = makeGetter('seconds'), + minutes = makeGetter('minutes'), + hours = makeGetter('hours'), + days = makeGetter('days'), + months = makeGetter('months'), + years = makeGetter('years'); + + function weeks() { + return absFloor(this.days() / 7); + } + + var round = Math.round, + thresholds = { + ss: 44, // a few seconds to seconds + s: 45, // seconds to minute + m: 45, // minutes to hour + h: 22, // hours to day + d: 26, // days to month/week + w: null, // weeks to month + M: 11, // months to year + }; + + // helper function for moment.fn.from, moment.fn.fromNow, and moment.duration.fn.humanize + function substituteTimeAgo(string, number, withoutSuffix, isFuture, locale) { + return locale.relativeTime(number || 1, !!withoutSuffix, string, isFuture); + } + + function relativeTime$1(posNegDuration, withoutSuffix, thresholds, locale) { + var duration = createDuration(posNegDuration).abs(), + seconds = round(duration.as('s')), + minutes = round(duration.as('m')), + hours = round(duration.as('h')), + days = round(duration.as('d')), + months = round(duration.as('M')), + weeks = round(duration.as('w')), + years = round(duration.as('y')), + a = + (seconds <= thresholds.ss && ['s', seconds]) || + (seconds < thresholds.s && ['ss', seconds]) || + (minutes <= 1 && ['m']) || + (minutes < thresholds.m && ['mm', minutes]) || + (hours <= 1 && ['h']) || + (hours < thresholds.h && ['hh', hours]) || + (days <= 1 && ['d']) || + (days < thresholds.d && ['dd', days]); + + if (thresholds.w != null) { + a = + a || + (weeks <= 1 && ['w']) || + (weeks < thresholds.w && ['ww', weeks]); + } + a = a || + (months <= 1 && ['M']) || + (months < thresholds.M && ['MM', months]) || + (years <= 1 && ['y']) || ['yy', years]; + + a[2] = withoutSuffix; + a[3] = +posNegDuration > 0; + a[4] = locale; + return substituteTimeAgo.apply(null, a); + } + + // This function allows you to set the rounding function for relative time strings + function getSetRelativeTimeRounding(roundingFunction) { + if (roundingFunction === undefined) { + return round; + } + if (typeof roundingFunction === 'function') { + round = roundingFunction; + return true; + } + return false; + } + + // This function allows you to set a threshold for relative time strings + function getSetRelativeTimeThreshold(threshold, limit) { + if (thresholds[threshold] === undefined) { + return false; + } + if (limit === undefined) { + return thresholds[threshold]; + } + thresholds[threshold] = limit; + if (threshold === 's') { + thresholds.ss = limit - 1; + } + return true; + } + + function humanize(argWithSuffix, argThresholds) { + if (!this.isValid()) { + return this.localeData().invalidDate(); + } + + var withSuffix = false, + th = thresholds, + locale, + output; + + if (typeof argWithSuffix === 'object') { + argThresholds = argWithSuffix; + argWithSuffix = false; + } + if (typeof argWithSuffix === 'boolean') { + withSuffix = argWithSuffix; + } + if (typeof argThresholds === 'object') { + th = Object.assign({}, thresholds, argThresholds); + if (argThresholds.s != null && argThresholds.ss == null) { + th.ss = argThresholds.s - 1; + } + } + + locale = this.localeData(); + output = relativeTime$1(this, !withSuffix, th, locale); + + if (withSuffix) { + output = locale.pastFuture(+this, output); + } + + return locale.postformat(output); + } + + var abs$1 = Math.abs; + + function sign(x) { + return (x > 0) - (x < 0) || +x; + } + + function toISOString$1() { + // for ISO strings we do not use the normal bubbling rules: + // * milliseconds bubble up until they become hours + // * days do not bubble at all + // * months bubble up until they become years + // This is because there is no context-free conversion between hours and days + // (think of clock changes) + // and also not between days and months (28-31 days per month) + if (!this.isValid()) { + return this.localeData().invalidDate(); + } + + var seconds = abs$1(this._milliseconds) / 1000, + days = abs$1(this._days), + months = abs$1(this._months), + minutes, + hours, + years, + s, + total = this.asSeconds(), + totalSign, + ymSign, + daysSign, + hmsSign; + + if (!total) { + // this is the same as C#'s (Noda) and python (isodate)... + // but not other JS (goog.date) + return 'P0D'; + } + + // 3600 seconds -> 60 minutes -> 1 hour + minutes = absFloor(seconds / 60); + hours = absFloor(minutes / 60); + seconds %= 60; + minutes %= 60; + + // 12 months -> 1 year + years = absFloor(months / 12); + months %= 12; + + // inspired by https://github.com/dordille/moment-isoduration/blob/master/moment.isoduration.js + s = seconds ? seconds.toFixed(3).replace(/\.?0+$/, '') : ''; + + totalSign = total < 0 ? '-' : ''; + ymSign = sign(this._months) !== sign(total) ? '-' : ''; + daysSign = sign(this._days) !== sign(total) ? '-' : ''; + hmsSign = sign(this._milliseconds) !== sign(total) ? '-' : ''; + + return ( + totalSign + + 'P' + + (years ? ymSign + years + 'Y' : '') + + (months ? ymSign + months + 'M' : '') + + (days ? daysSign + days + 'D' : '') + + (hours || minutes || seconds ? 'T' : '') + + (hours ? hmsSign + hours + 'H' : '') + + (minutes ? hmsSign + minutes + 'M' : '') + + (seconds ? hmsSign + s + 'S' : '') + ); + } + + var proto$2 = Duration.prototype; + + proto$2.isValid = isValid$1; + proto$2.abs = abs; + proto$2.add = add$1; + proto$2.subtract = subtract$1; + proto$2.as = as; + proto$2.asMilliseconds = asMilliseconds; + proto$2.asSeconds = asSeconds; + proto$2.asMinutes = asMinutes; + proto$2.asHours = asHours; + proto$2.asDays = asDays; + proto$2.asWeeks = asWeeks; + proto$2.asMonths = asMonths; + proto$2.asQuarters = asQuarters; + proto$2.asYears = asYears; + proto$2.valueOf = valueOf$1; + proto$2._bubble = bubble; + proto$2.clone = clone$1; + proto$2.get = get$2; + proto$2.milliseconds = milliseconds; + proto$2.seconds = seconds; + proto$2.minutes = minutes; + proto$2.hours = hours; + proto$2.days = days; + proto$2.weeks = weeks; + proto$2.months = months; + proto$2.years = years; + proto$2.humanize = humanize; + proto$2.toISOString = toISOString$1; + proto$2.toString = toISOString$1; + proto$2.toJSON = toISOString$1; + proto$2.locale = locale; + proto$2.localeData = localeData; + + proto$2.toIsoString = deprecate( + 'toIsoString() is deprecated. Please use toISOString() instead (notice the capitals)', + toISOString$1 + ); + proto$2.lang = lang; + + // FORMATTING + + addFormatToken('X', 0, 0, 'unix'); + addFormatToken('x', 0, 0, 'valueOf'); + + // PARSING + + addRegexToken('x', matchSigned); + addRegexToken('X', matchTimestamp); + addParseToken('X', function (input, array, config) { + config._d = new Date(parseFloat(input) * 1000); + }); + addParseToken('x', function (input, array, config) { + config._d = new Date(toInt(input)); + }); + + //! moment.js + + hooks.version = '2.29.1'; + + setHookCallback(createLocal); + + hooks.fn = proto; + hooks.min = min; + hooks.max = max; + hooks.now = now; + hooks.utc = createUTC; + hooks.unix = createUnix; + hooks.months = listMonths; + hooks.isDate = isDate; + hooks.locale = getSetGlobalLocale; + hooks.invalid = createInvalid; + hooks.duration = createDuration; + hooks.isMoment = isMoment; + hooks.weekdays = listWeekdays; + hooks.parseZone = createInZone; + hooks.localeData = getLocale; + hooks.isDuration = isDuration; + hooks.monthsShort = listMonthsShort; + hooks.weekdaysMin = listWeekdaysMin; + hooks.defineLocale = defineLocale; + hooks.updateLocale = updateLocale; + hooks.locales = listLocales; + hooks.weekdaysShort = listWeekdaysShort; + hooks.normalizeUnits = normalizeUnits; + hooks.relativeTimeRounding = getSetRelativeTimeRounding; + hooks.relativeTimeThreshold = getSetRelativeTimeThreshold; + hooks.calendarFormat = getCalendarFormat; + hooks.prototype = proto; + + // currently HTML5 input type only supports 24-hour formats + hooks.HTML5_FMT = { + DATETIME_LOCAL: 'YYYY-MM-DDTHH:mm', // + DATETIME_LOCAL_SECONDS: 'YYYY-MM-DDTHH:mm:ss', // + DATETIME_LOCAL_MS: 'YYYY-MM-DDTHH:mm:ss.SSS', // + DATE: 'YYYY-MM-DD', // + TIME: 'HH:mm', // + TIME_SECONDS: 'HH:mm:ss', // + TIME_MS: 'HH:mm:ss.SSS', // + WEEK: 'GGGG-[W]WW', // + MONTH: 'YYYY-MM', // + }; + + return hooks; + +}))); + + +/***/ }), + +/***/ 294: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +module.exports = __nccwpck_require__(219); + + +/***/ }), + +/***/ 219: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +var net = __nccwpck_require__(631); +var tls = __nccwpck_require__(16); +var http = __nccwpck_require__(605); +var https = __nccwpck_require__(211); +var events = __nccwpck_require__(614); +var assert = __nccwpck_require__(357); +var util = __nccwpck_require__(669); + + +exports.httpOverHttp = httpOverHttp; +exports.httpsOverHttp = httpsOverHttp; +exports.httpOverHttps = httpOverHttps; +exports.httpsOverHttps = httpsOverHttps; + + +function httpOverHttp(options) { + var agent = new TunnelingAgent(options); + agent.request = http.request; + return agent; +} + +function httpsOverHttp(options) { + var agent = new TunnelingAgent(options); + agent.request = http.request; + agent.createSocket = createSecureSocket; + agent.defaultPort = 443; + return agent; +} + +function httpOverHttps(options) { + var agent = new TunnelingAgent(options); + agent.request = https.request; + return agent; +} + +function httpsOverHttps(options) { + var agent = new TunnelingAgent(options); + agent.request = https.request; + agent.createSocket = createSecureSocket; + agent.defaultPort = 443; + return agent; +} + + +function TunnelingAgent(options) { + var self = this; + self.options = options || {}; + self.proxyOptions = self.options.proxy || {}; + self.maxSockets = self.options.maxSockets || http.Agent.defaultMaxSockets; + self.requests = []; + self.sockets = []; + + self.on('free', function onFree(socket, host, port, localAddress) { + var options = toOptions(host, port, localAddress); + for (var i = 0, len = self.requests.length; i < len; ++i) { + var pending = self.requests[i]; + if (pending.host === options.host && pending.port === options.port) { + // Detect the request to connect same origin server, + // reuse the connection. + self.requests.splice(i, 1); + pending.request.onSocket(socket); + return; + } + } + socket.destroy(); + self.removeSocket(socket); + }); +} +util.inherits(TunnelingAgent, events.EventEmitter); + +TunnelingAgent.prototype.addRequest = function addRequest(req, host, port, localAddress) { + var self = this; + var options = mergeOptions({request: req}, self.options, toOptions(host, port, localAddress)); + + if (self.sockets.length >= this.maxSockets) { + // We are over limit so we'll add it to the queue. + self.requests.push(options); + return; + } + + // If we are under maxSockets create a new one. + self.createSocket(options, function(socket) { + socket.on('free', onFree); + socket.on('close', onCloseOrRemove); + socket.on('agentRemove', onCloseOrRemove); + req.onSocket(socket); + + function onFree() { + self.emit('free', socket, options); + } + + function onCloseOrRemove(err) { + self.removeSocket(socket); + socket.removeListener('free', onFree); + socket.removeListener('close', onCloseOrRemove); + socket.removeListener('agentRemove', onCloseOrRemove); + } + }); +}; + +TunnelingAgent.prototype.createSocket = function createSocket(options, cb) { + var self = this; + var placeholder = {}; + self.sockets.push(placeholder); + + var connectOptions = mergeOptions({}, self.proxyOptions, { + method: 'CONNECT', + path: options.host + ':' + options.port, + agent: false, + headers: { + host: options.host + ':' + options.port + } + }); + if (options.localAddress) { + connectOptions.localAddress = options.localAddress; + } + if (connectOptions.proxyAuth) { + connectOptions.headers = connectOptions.headers || {}; + connectOptions.headers['Proxy-Authorization'] = 'Basic ' + + new Buffer(connectOptions.proxyAuth).toString('base64'); + } + + debug('making CONNECT request'); + var connectReq = self.request(connectOptions); + connectReq.useChunkedEncodingByDefault = false; // for v0.6 + connectReq.once('response', onResponse); // for v0.6 + connectReq.once('upgrade', onUpgrade); // for v0.6 + connectReq.once('connect', onConnect); // for v0.7 or later + connectReq.once('error', onError); + connectReq.end(); + + function onResponse(res) { + // Very hacky. This is necessary to avoid http-parser leaks. + res.upgrade = true; + } + + function onUpgrade(res, socket, head) { + // Hacky. + process.nextTick(function() { + onConnect(res, socket, head); + }); + } + + function onConnect(res, socket, head) { + connectReq.removeAllListeners(); + socket.removeAllListeners(); + + if (res.statusCode !== 200) { + debug('tunneling socket could not be established, statusCode=%d', + res.statusCode); + socket.destroy(); + var error = new Error('tunneling socket could not be established, ' + + 'statusCode=' + res.statusCode); + error.code = 'ECONNRESET'; + options.request.emit('error', error); + self.removeSocket(placeholder); + return; + } + if (head.length > 0) { + debug('got illegal response body from proxy'); + socket.destroy(); + var error = new Error('got illegal response body from proxy'); + error.code = 'ECONNRESET'; + options.request.emit('error', error); + self.removeSocket(placeholder); + return; + } + debug('tunneling connection has established'); + self.sockets[self.sockets.indexOf(placeholder)] = socket; + return cb(socket); + } + + function onError(cause) { + connectReq.removeAllListeners(); + + debug('tunneling socket could not be established, cause=%s\n', + cause.message, cause.stack); + var error = new Error('tunneling socket could not be established, ' + + 'cause=' + cause.message); + error.code = 'ECONNRESET'; + options.request.emit('error', error); + self.removeSocket(placeholder); + } +}; + +TunnelingAgent.prototype.removeSocket = function removeSocket(socket) { + var pos = this.sockets.indexOf(socket) + if (pos === -1) { + return; + } + this.sockets.splice(pos, 1); + + var pending = this.requests.shift(); + if (pending) { + // If we have pending requests and a socket gets closed a new one + // needs to be created to take over in the pool for the one that closed. + this.createSocket(pending, function(socket) { + pending.request.onSocket(socket); + }); + } +}; + +function createSecureSocket(options, cb) { + var self = this; + TunnelingAgent.prototype.createSocket.call(self, options, function(socket) { + var hostHeader = options.request.getHeader('host'); + var tlsOptions = mergeOptions({}, self.options, { + socket: socket, + servername: hostHeader ? hostHeader.replace(/:.*$/, '') : options.host + }); + + // 0 is dummy port for v0.6 + var secureSocket = tls.connect(0, tlsOptions); + self.sockets[self.sockets.indexOf(socket)] = secureSocket; + cb(secureSocket); + }); +} + + +function toOptions(host, port, localAddress) { + if (typeof host === 'string') { // since v0.10 + return { + host: host, + port: port, + localAddress: localAddress + }; + } + return host; // for v0.11 or later +} + +function mergeOptions(target) { + for (var i = 1, len = arguments.length; i < len; ++i) { + var overrides = arguments[i]; + if (typeof overrides === 'object') { + var keys = Object.keys(overrides); + for (var j = 0, keyLen = keys.length; j < keyLen; ++j) { + var k = keys[j]; + if (overrides[k] !== undefined) { + target[k] = overrides[k]; + } + } + } + } + return target; +} + + +var debug; +if (process.env.NODE_DEBUG && /\btunnel\b/.test(process.env.NODE_DEBUG)) { + debug = function() { + var args = Array.prototype.slice.call(arguments); + if (typeof args[0] === 'string') { + args[0] = 'TUNNEL: ' + args[0]; + } else { + args.unshift('TUNNEL:'); + } + console.error.apply(console, args); + } +} else { + debug = function() {}; +} +exports.debug = debug; // for test + + +/***/ }), + +/***/ 707: +/***/ ((module) => { + +/** + * Convert array of 16 byte values to UUID string format of the form: + * XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX + */ +var byteToHex = []; +for (var i = 0; i < 256; ++i) { + byteToHex[i] = (i + 0x100).toString(16).substr(1); +} + +function bytesToUuid(buf, offset) { + var i = offset || 0; + var bth = byteToHex; + // join used to fix memory issue caused by concatenation: https://bugs.chromium.org/p/v8/issues/detail?id=3175#c4 + return ([ + bth[buf[i++]], bth[buf[i++]], + bth[buf[i++]], bth[buf[i++]], '-', + bth[buf[i++]], bth[buf[i++]], '-', + bth[buf[i++]], bth[buf[i++]], '-', + bth[buf[i++]], bth[buf[i++]], '-', + bth[buf[i++]], bth[buf[i++]], + bth[buf[i++]], bth[buf[i++]], + bth[buf[i++]], bth[buf[i++]] + ]).join(''); +} + +module.exports = bytesToUuid; + + +/***/ }), + +/***/ 859: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +// Unique ID creation requires a high quality random # generator. In node.js +// this is pretty straight-forward - we use the crypto API. + +var crypto = __nccwpck_require__(417); + +module.exports = function nodeRNG() { + return crypto.randomBytes(16); +}; + + +/***/ }), + +/***/ 824: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +var rng = __nccwpck_require__(859); +var bytesToUuid = __nccwpck_require__(707); + +function v4(options, buf, offset) { + var i = buf && offset || 0; + + if (typeof(options) == 'string') { + buf = options === 'binary' ? new Array(16) : null; + options = null; + } + options = options || {}; + + var rnds = options.random || (options.rng || rng)(); + + // Per 4.4, set bits for version and `clock_seq_hi_and_reserved` + rnds[6] = (rnds[6] & 0x0f) | 0x40; + rnds[8] = (rnds[8] & 0x3f) | 0x80; + + // Copy bytes to buffer, if provided + if (buf) { + for (var ii = 0; ii < 16; ++ii) { + buf[i + ii] = rnds[ii]; + } + } + + return buf || bytesToUuid(rnds); +} + +module.exports = v4; + + +/***/ }), + +/***/ 571: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +const fs = __nccwpck_require__(747); +const moment = __nccwpck_require__(623) + +const kicsLogo = "https://user-images.githubusercontent.com/75368139/136991766-a4e5bc8b-63db-48f7-9384-740e9f15c9f6.png" +const severityOrder = ["HIGH", "MEDIUM", "LOW", "INFO", "TRACE"]; +const severityIcons = { + "HIGH": "https://user-images.githubusercontent.com/23239410/92157087-97285600-ee32-11ea-988f-0aca12c4c126.png", + "MEDIUM": "https://user-images.githubusercontent.com/23239410/92157093-98598300-ee32-11ea-83d7-af52251a011b.png", + "LOW": "https://user-images.githubusercontent.com/23239410/92157091-98598300-ee32-11ea-8498-19bd7d62019b.png", + "INFO": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png", + "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" +} + + +function readJSON(filename) { + const rawdata = fs.readFileSync(filename); + const parsedJSON = JSON.parse(rawdata.toString()); + return parsedJSON; +} + +function createComment(results) { + let message = "![kics-logo](" + kicsLogo + ")\n"; + + message += "---"; + message += `\n**KICS version: ${results['kics_version']}**\n` + message += "\n**Total Results: " + results['total_counter'] + "**\n\n"; + message += "| | Category | Results |\n"; + message += "| --- |--- | --- |\n"; + let severityCounters = results['severity_counters'] + for (let severity of severityOrder) { + if (severity in severityCounters) { + message += "| ![" + severity + "](" + severityIcons[severity] + ") |" + severity.toUpperCase() + " | " + severityCounters[severity.toUpperCase()] + " |\n"; + } + } + + message += "\n**Scan Metrics**\n\n"; + message += "| Metric | Values |\n"; + message += "| --- | --- |\n"; + message += "| Files scanned | " + results['files_scanned'] + "\n"; + message += "| Files parsed | " + results['files_parsed'] + "\n"; + message += "| Files failed to scan | " + results['files_failed_to_scan'] + "\n"; + message += "| Total queries | " + results['queries_total'] + "\n"; + message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; + + let executionTime = moment(results['end']).diff(moment(results['start']), 'seconds'); + + message += "| Execution time | " + executionTime + "s\n"; + + return message; +} + +async function postPRComment(repo, prNumber) { + const githubToken = core.getInput("token"); + const octokit = github.getOctokit(githubToken); + const results = readJSON("results.json"); + const message = createComment(results); + console.log(message); + + const { data: comments } = await octokit.rest.issues.listComments({ + ...repo, + issue_number: prNumber, + }); + + const comment = comments.find((comment) => { + return ( + comment.user.login === "github-actions[bot]" && + comment.body.startsWith("![kics-logo](" + kicsLogo + ")\n") + ); + }); + + if (comment) { + await octokit.rest.issues.updateComment({ + ...repo, + comment_id: comment.id, + body: message + }); + } else { + await octokit.rest.issues.createComment({ + ...repo, + issue_number: prNumber, + body: message + }); + } +} + +module.exports = { + postPRComment +}; + +/***/ }), + +/***/ 430: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +const https = __nccwpck_require__(211) +const filepath = __nccwpck_require__(622); +const tc = __nccwpck_require__(784); +//const releaseDownloader = require('@fohlen/github-release-downloader'); +const os = __nccwpck_require__(87); +//const decompress = require('decompress'); +//const decompressTargz = require('decompress-targz'); + +function getVersion(version) { + let path = '' + if (version == "latest") { + path = '/repos/checkmarx/kics/releases/latest' + } else { + path = '/repos/checkmarx/kics/releases/tags/' + version + } + const options = { + hostname: 'api.github.com', + port: 443, + path: path, + headers: { + 'User-Agent': 'node.js' + }, + method: 'GET' + } + return new Promise((resolve, reject) => { + const req = https.get(options, (resp) => { + console.log(`${options.method} https://${options.hostname}${options.path} ${resp.statusCode}`) + let rawData = ''; + resp.on('data', (d) => { + rawData += d; + }); + resp.on('end', () => { + try { + const parsedData = JSON.parse(rawData); + resolve(parsedData); + } catch (e) { + reject(e); + } + }); + }) + + req.on('error', (error) => { + reject(error); + }) + }) +} + +function getReleaseInfo(release) { + const assets = release.assets || []; + const os = process.platform; + const arch = process.arch; + let targetAsset; + switch (os) { + case 'darwin': + targetAsset = assets.filter((asset) => asset.name.indexOf('darwin') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + case 'linux': + targetAsset = assets.filter((asset) => asset.name.indexOf('linux') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + case 'win32': + targetAsset = assets.filter((asset) => asset.name.indexOf('windows') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + default: + targetAsset = { size: 0, browser_download_url: '' }; + } + return { size: targetAsset.size, browser_download_url: targetAsset.browser_download_url, version: targetAsset.name }; +} + +// async function downloadReleaseFile(releaseAsset) { +// const dest = os.homedir(); +// const releaseURL = releaseAsset.browser_download_url; + +// console.log("Downloading", releaseURL); +// const baseName = releaseURL.substr(releaseURL.lastIndexOf("/") + 1); +// return releaseDownloader.downloadAsset(releaseURL, baseName, dest, () => { +// process.stdout.write("."); +// }); +// } + +// function decompressRelease(path) { +// const dest = os.homedir(); +// return decompress(path, filepath.join(dest, 'kics'), { +// plugins: [ +// decompressTargz() +// ] +// }); +// } + +// function getExecutableName() { +// const os = process.platform; +// switch (os) { +// case 'darwin': +// case 'linux': +// return 'kics'; +// case 'win32': +// return 'kics.exe'; +// default: +// return 'kics'; +// } +// } + +async function installKICS(kicsVersion) { + let release = {}; + if (!kicsVersion || kicsVersion == "latest") { + release = await getVersion("latest"); + } else { + release = await getVersion(kicsVersion); + } + const releaseInfo = getReleaseInfo(release) + + const kicsDownloadPath = await tc.downloadTool(releaseInfo.browser_download_url); + const kicsExtractedFolder = await tc.extractTar(kicsDownloadPath, filepath.join(os.homedir(), 'kics', releaseInfo.version)); + const cachedPath = await tc.cacheDir(kicsExtractedFolder, 'kics', releaseInfo.version); + core.addPath(cachedPath); + + // const releasePath = await downloadReleaseFile(releaseAsset, "./") + // console.log('\nDownloaded KICS release', releasePath); + // const files = await decompressRelease(releasePath); + // console.log('\nDecompressed KICS release', files.map(f => f.path)); + + // const kicsPath = filepath.join(os.homedir(), 'kics', getExecutableName()); + // console.log('\nInstalling KICS to', kicsPath); + return kicsPath; +} + +module.exports = { + installKICS +} + +/***/ }), + +/***/ 157: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +const exec = __nccwpck_require__(514); + +const core = __nccwpck_require__(186); + +const kicsInputs = { + path: { flag: '--path', value: core.getInput('path') }, + ignore_on_exit: { flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, + fail_on: { flag: '--fail-on', value: core.getInput('fail_on') }, + timeout: { flag: '--timeout', value: core.getInput('timeout') }, + profiling: { flag: '--profiling', value: core.getInput('profiling') }, + config_path: { flag: '--config', value: core.getInput('config_path') }, + payload_path: { flag: '--payload-path', value: core.getInput('payload_path') }, + exclude_paths: { flag: '--exclude-paths', value: core.getInput('exclude_paths') }, + exclude_queries: { flag: '--exclude-queries', value: core.getInput('exclude_queries') }, + exclude_categories: { flag: '--exclude-categories', value: core.getInput('exclude_categories') }, + exclude_results: { flag: '--exclude-results', value: core.getInput('exclude_results') }, + output_formats: { flag: '--report-formats', value: core.getInput('output_formats') }, + output_path: { flag: '--output-path', value: core.getInput('output_path') }, + queries: { flag: '--queries-path', value: core.getInput('queries') }, + verbose: { flag: '--verbose', value: core.getInput('verbose') }, + secrets_regexes_path: { flag: '--secrets-regexes-path', value: core.getInput('secrets_regexes_path') }, + libraries_path: { flag: '--libraries-path', value: core.getInput('libraries-path') }, + disable_secrets: { flag: '--disable-secrets', value: core.getInput('disable_secrets') }, + disable_full_descriptions: { flag: '--disable-full-descriptions', value: core.getInput('disable_full_descriptions') }, + types: { flag: '--types', value: core.getInput('types') }, + bom: { flag: '--bom', value: core.getInput('bom') }, +}; + +async function scanWithKICS(kicsPath) { + let statusCode = 0; + if (kicsInputs.config_path.value) { + statusCode = await exec.exec(`${kicsPath} scan ${kicsInputs.config_path.flag} ${kicsInputs.config_path.value}`); + } +} + +module.exports = { + scanWithKICS +}; + +/***/ }), + +/***/ 357: +/***/ ((module) => { + +"use strict"; +module.exports = require("assert"); + +/***/ }), + +/***/ 129: +/***/ ((module) => { + +"use strict"; +module.exports = require("child_process"); + +/***/ }), + +/***/ 417: +/***/ ((module) => { + +"use strict"; +module.exports = require("crypto"); + +/***/ }), + +/***/ 614: +/***/ ((module) => { + +"use strict"; +module.exports = require("events"); + +/***/ }), + +/***/ 747: +/***/ ((module) => { + +"use strict"; +module.exports = require("fs"); + +/***/ }), + +/***/ 605: +/***/ ((module) => { + +"use strict"; +module.exports = require("http"); + +/***/ }), + +/***/ 211: +/***/ ((module) => { + +"use strict"; +module.exports = require("https"); + +/***/ }), + +/***/ 631: +/***/ ((module) => { + +"use strict"; +module.exports = require("net"); + +/***/ }), + +/***/ 87: +/***/ ((module) => { + +"use strict"; +module.exports = require("os"); + +/***/ }), + +/***/ 622: +/***/ ((module) => { + +"use strict"; +module.exports = require("path"); + +/***/ }), + +/***/ 413: +/***/ ((module) => { + +"use strict"; +module.exports = require("stream"); + +/***/ }), + +/***/ 304: +/***/ ((module) => { + +"use strict"; +module.exports = require("string_decoder"); + +/***/ }), + +/***/ 213: +/***/ ((module) => { + +"use strict"; +module.exports = require("timers"); + +/***/ }), + +/***/ 16: +/***/ ((module) => { + +"use strict"; +module.exports = require("tls"); + +/***/ }), + +/***/ 669: +/***/ ((module) => { + +"use strict"; +module.exports = require("util"); + +/***/ }) + +/******/ }); +/************************************************************************/ +/******/ // The module cache +/******/ var __webpack_module_cache__ = {}; +/******/ +/******/ // The require function +/******/ function __nccwpck_require__(moduleId) { +/******/ // Check if module is in cache +/******/ var cachedModule = __webpack_module_cache__[moduleId]; +/******/ if (cachedModule !== undefined) { +/******/ return cachedModule.exports; +/******/ } +/******/ // Create a new module (and put it into the cache) +/******/ var module = __webpack_module_cache__[moduleId] = { +/******/ id: moduleId, +/******/ loaded: false, +/******/ exports: {} +/******/ }; +/******/ +/******/ // Execute the module function +/******/ var threw = true; +/******/ try { +/******/ __webpack_modules__[moduleId].call(module.exports, module, module.exports, __nccwpck_require__); +/******/ threw = false; +/******/ } finally { +/******/ if(threw) delete __webpack_module_cache__[moduleId]; +/******/ } +/******/ +/******/ // Flag the module as loaded +/******/ module.loaded = true; +/******/ +/******/ // Return the exports of the module +/******/ return module.exports; +/******/ } +/******/ +/************************************************************************/ +/******/ /* webpack/runtime/node module decorator */ +/******/ (() => { +/******/ __nccwpck_require__.nmd = (module) => { +/******/ module.paths = []; +/******/ if (!module.children) module.children = []; +/******/ return module; +/******/ }; +/******/ })(); +/******/ +/******/ /* webpack/runtime/compat */ +/******/ +/******/ if (typeof __nccwpck_require__ !== 'undefined') __nccwpck_require__.ab = __dirname + "/"; +/******/ +/************************************************************************/ +var __webpack_exports__ = {}; +// This entry need to be wrapped in an IIFE because it need to be isolated against other modules in the chunk. +(() => { +const install = __nccwpck_require__(430); +const commenter = __nccwpck_require__(571); +const scanner = __nccwpck_require__(157); +const core = __nccwpck_require__(186); + +const actionInputs = { + kics_version: { value: core.getInput('kics_version') }, + enable_pr_comments: { value: core.getInput('enable_pr_comments') }, +} + +async function main() { + console.log("Running KICS action..."); + try { + // const context = github.context; + // const repository = context.repo; + // const pullRequestNumber = context.payload.pull_request.number; + const kicsPath = await install.installKICS(actionInputs.kics_version.value); + console.log("KICS installed at: " + kicsPath); + //await scanner.scanWithKICS(kicsPath); + // if (actionInputs.enable_pr_comments.value === "true") { + // await commenter.commentOnPullRequest(repository, pullRequestNumber); + // } + } catch (e) { + console.error(e); + core.setFailed(e.message); + } +} + +main(); +})(); + +module.exports = __webpack_exports__; +/******/ })() +; \ No newline at end of file diff --git a/entrypoint.sh b/entrypoint.sh index 273f192..82c4d24 100644 --- a/entrypoint.sh +++ b/entrypoint.sh @@ -1,5 +1,5 @@ -#!/bin/ash -DATETIME="`date '+%H:%M'`" +#!/bin/bash +DATETIME=$(date '+%H:%M') if [ -z "$INPUT_PATH" ] then @@ -9,30 +9,30 @@ else INPUT_PARAM="-p $INPUT_PATH" fi -[[ ! -z "$INPUT_OUTPUT_PATH" ]] && OUTPUT_PATH_PARAM="-o $INPUT_OUTPUT_PATH" -[[ ! -z "$INPUT_PAYLOAD_PATH" ]] && PAYLOAD_PATH_PARAM="-d $INPUT_PAYLOAD_PATH" -[[ ! -z "$INPUT_CONFIG_PATH" ]] && CONFIG_PATH_PARAM="--config $INPUT_CONFIG_PATH" -[[ ! -z "$INPUT_EXCLUDE_PATHS" ]] && EXCLUDE_PATHS_PARAM="-e $INPUT_EXCLUDE_PATHS" -[[ ! -z "$INPUT_EXCLUDE_RESULTS" ]] && EXCLUDE_RESULTS_PARAM="-x $INPUT_EXCLUDE_RESULTS" -[[ ! -z "$INPUT_EXCLUDE_QUERIES" ]] && EXCLUDE_QUERIES_PARAM="--exclude-queries $INPUT_EXCLUDE_QUERIES" -[[ ! -z "$INPUT_EXCLUDE_CATEGORIES" ]] && EXCLUDE_CATEGORIES_PARAM="--exclude-categories $INPUT_EXCLUDE_CATEGORIES" -[[ ! -z "$INPUT_OUTPUT_FORMATS" ]] && OUTPUT_FORMATS_PARAM="--report-formats $INPUT_OUTPUT_FORMATS" -[[ ! -z "$INPUT_PLATFORM_TYPE" ]] && PLATFORM_TYPE_PARAM="--type $INPUT_PLATFORM_TYPE" -[[ ! -z "$INPUT_IGNORE_ON_EXIT" ]] && IGNORE_ON_EXIT_PARAM="--ignore-on-exit $INPUT_IGNORE_ON_EXIT" -[[ ! -z "$INPUT_FAIL_ON" ]] && FAIL_ON_PARAM="--fail-on $INPUT_FAIL_ON" -[[ ! -z "$INPUT_TIMEOUT" ]] && TIMEOUT_PARAM="--timeout $INPUT_TIMEOUT" -[[ ! -z "$INPUT_PROFILING" ]] && PROFILING_PARAM="--profiling $INPUT_PROFILING" +[[ -n "$INPUT_OUTPUT_PATH" ]] && OUTPUT_PATH_PARAM="-o $INPUT_OUTPUT_PATH" +[[ -n "$INPUT_PAYLOAD_PATH" ]] && PAYLOAD_PATH_PARAM="-d $INPUT_PAYLOAD_PATH" +[[ -n "$INPUT_CONFIG_PATH" ]] && CONFIG_PATH_PARAM="--config $INPUT_CONFIG_PATH" +[[ -n "$INPUT_EXCLUDE_PATHS" ]] && EXCLUDE_PATHS_PARAM="-e $INPUT_EXCLUDE_PATHS" +[[ -n "$INPUT_EXCLUDE_RESULTS" ]] && EXCLUDE_RESULTS_PARAM="-x $INPUT_EXCLUDE_RESULTS" +[[ -n "$INPUT_EXCLUDE_QUERIES" ]] && EXCLUDE_QUERIES_PARAM="--exclude-queries $INPUT_EXCLUDE_QUERIES" +[[ -n "$INPUT_EXCLUDE_CATEGORIES" ]] && EXCLUDE_CATEGORIES_PARAM="--exclude-categories $INPUT_EXCLUDE_CATEGORIES" +[[ -n "$INPUT_OUTPUT_FORMATS" ]] && OUTPUT_FORMATS_PARAM="--report-formats $INPUT_OUTPUT_FORMATS" +[[ -n "$INPUT_PLATFORM_TYPE" ]] && PLATFORM_TYPE_PARAM="--type $INPUT_PLATFORM_TYPE" +[[ -n "$INPUT_IGNORE_ON_EXIT" ]] && IGNORE_ON_EXIT_PARAM="--ignore-on-exit $INPUT_IGNORE_ON_EXIT" +[[ -n "$INPUT_FAIL_ON" ]] && FAIL_ON_PARAM="--fail-on $INPUT_FAIL_ON" +[[ -n "$INPUT_TIMEOUT" ]] && TIMEOUT_PARAM="--timeout $INPUT_TIMEOUT" +[[ -n "$INPUT_PROFILING" ]] && PROFILING_PARAM="--profiling $INPUT_PROFILING" -[[ ! -z "$INPUT_VERBOSE" ]] && VERBOSE_PARAM="-v" +[[ -n "$INPUT_VERBOSE" ]] && VERBOSE_PARAM="-v" -if [ ! -z "$INPUT_QUERIES" ] +if [ -n "$INPUT_QUERIES" ] then QUERIES_PARAM="-q $INPUT_QUERIES" else QUERIES_PARAM="-q /app/bin/assets/queries" fi -cd $GITHUB_WORKSPACE +cd "$GITHUB_WORKSPACE" || exit 1 echo "${DATETIME} - INF : about to scan directory $INPUT_PATH" echo "${DATETIME} - INF : kics command kics $INPUT_PARAM $OUTPUT_PATH_PARAM $OUTPUT_FORMATS_PARAM $PLATFORM_TYPE_PARAM $PAYLOAD_PATH_PARAM $CONFIG_PATH_PARAM $EXCLUDE_PATHS_PARAM $EXCLUDE_CATEGORIES_PARAM $EXCLUDE_RESULTS_PARAM $EXCLUDE_QUERIES_PARAM $QUERIES_PARAM $VERBOSE_PARAM $IGNORE_ON_EXIT_PARAM $FAIL_ON_PARAM $TIMEOUT_PARAM $PROFILING_PARAM" -/app/bin/kics scan --no-progress $INPUT_PARAM $OUTPUT_PATH_PARAM $OUTPUT_FORMATS_PARAM $PLATFORM_TYPE_PARAM $PAYLOAD_PATH_PARAM $CONFIG_PATH_PARAM $EXCLUDE_PATHS_PARAM $EXCLUDE_CATEGORIES_PARAM $EXCLUDE_RESULTS_PARAM $EXCLUDE_QUERIES_PARAM $QUERIES_PARAM $VERBOSE_PARAM $IGNORE_ON_EXIT_PARAM $FAIL_ON_PARAM $TIMEOUT_PARAM $PROFILING_PARAM \ No newline at end of file +/app/bin/kics scan --no-progress "$INPUT_PARAM" "$OUTPUT_PATH_PARAM" "$OUTPUT_FORMATS_PARAM" "$PLATFORM_TYPE_PARAM" "$PAYLOAD_PATH_PARAM" "$CONFIG_PATH_PARAM" "$EXCLUDE_PATHS_PARAM" "$EXCLUDE_CATEGORIES_PARAM" "$EXCLUDE_RESULTS_PARAM" "$EXCLUDE_QUERIES_PARAM" "$QUERIES_PARAM" "$VERBOSE_PARAM" "$IGNORE_ON_EXIT_PARAM" "$FAIL_ON_PARAM" "$TIMEOUT_PARAM" "$PROFILING_PARAM" \ No newline at end of file diff --git a/package-lock.json b/package-lock.json new file mode 100644 index 0000000..4aa2710 --- /dev/null +++ b/package-lock.json @@ -0,0 +1,542 @@ +{ + "name": "kics-github-action", + "version": "1.0.0", + "lockfileVersion": 2, + "requires": true, + "packages": { + "": { + "name": "kics-github-action", + "version": "1.0.0", + "license": "GNU GENERAL PUBLIC LICENSE", + "dependencies": { + "@actions/core": "^1.6.0", + "@actions/exec": "^1.1.0", + "@actions/github": "^5.0.0", + "@actions/tool-cache": "^1.7.1", + "moment": "^2.29.1" + }, + "devDependencies": { + "@vercel/ncc": "^0.31.1", + "prettier": "^2.4.1" + } + }, + "node_modules/@actions/core": { + "version": "1.6.0", + "resolved": "https://registry.npmjs.org/@actions/core/-/core-1.6.0.tgz", + "integrity": "sha512-NB1UAZomZlCV/LmJqkLhNTqtKfFXJZAUPcfl/zqG7EfsQdeUJtaWO98SGbuQ3pydJ3fHl2CvI/51OKYlCYYcaw==", + "dependencies": { + "@actions/http-client": "^1.0.11" + } + }, + "node_modules/@actions/exec": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/@actions/exec/-/exec-1.1.0.tgz", + "integrity": "sha512-LImpN9AY0J1R1mEYJjVJfSZWU4zYOlEcwSTgPve1rFQqK5AwrEs6uWW5Rv70gbDIQIAUwI86z6B+9mPK4w9Sbg==", + "dependencies": { + "@actions/io": "^1.0.1" + } + }, + "node_modules/@actions/github": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/@actions/github/-/github-5.0.0.tgz", + "integrity": "sha512-QvE9eAAfEsS+yOOk0cylLBIO/d6WyWIOvsxxzdrPFaud39G6BOkUwScXZn1iBzQzHyu9SBkkLSWlohDWdsasAQ==", + "dependencies": { + "@actions/http-client": "^1.0.11", + "@octokit/core": "^3.4.0", + "@octokit/plugin-paginate-rest": "^2.13.3", + "@octokit/plugin-rest-endpoint-methods": "^5.1.1" + } + }, + "node_modules/@actions/http-client": { + "version": "1.0.11", + "resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-1.0.11.tgz", + "integrity": "sha512-VRYHGQV1rqnROJqdMvGUbY/Kn8vriQe/F9HR2AlYHzmKuM/p3kjNuXhmdBfcVgsvRWTz5C5XW5xvndZrVBuAYg==", + "dependencies": { + "tunnel": "0.0.6" + } + }, + "node_modules/@actions/io": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/@actions/io/-/io-1.1.1.tgz", + "integrity": "sha512-Qi4JoKXjmE0O67wAOH6y0n26QXhMKMFo7GD/4IXNVcrtLjUlGjGuVys6pQgwF3ArfGTQu0XpqaNr0YhED2RaRA==" + }, + "node_modules/@actions/tool-cache": { + "version": "1.7.1", + "resolved": "https://registry.npmjs.org/@actions/tool-cache/-/tool-cache-1.7.1.tgz", + "integrity": "sha512-y1xxxOhXaBUIUit3lhepmu/0xdgiTMpnZRLmVdtF0hTm521doi+MdRRRP62czHvM7wxH6epj4JPNJQ3iJpOrkQ==", + "dependencies": { + "@actions/core": "^1.2.6", + "@actions/exec": "^1.0.0", + "@actions/http-client": "^1.0.8", + "@actions/io": "^1.1.1", + "semver": "^6.1.0", + "uuid": "^3.3.2" + } + }, + "node_modules/@actions/tool-cache/node_modules/semver": { + "version": "6.3.0", + "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz", + "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw==", + "bin": { + "semver": "bin/semver.js" + } + }, + "node_modules/@octokit/auth-token": { + "version": "2.5.0", + "resolved": "https://registry.npmjs.org/@octokit/auth-token/-/auth-token-2.5.0.tgz", + "integrity": "sha512-r5FVUJCOLl19AxiuZD2VRZ/ORjp/4IN98Of6YJoJOkY75CIBuYfmiNHGrDwXr+aLGG55igl9QrxX3hbiXlLb+g==", + "dependencies": { + "@octokit/types": "^6.0.3" + } + }, + "node_modules/@octokit/core": { + "version": "3.5.1", + "resolved": "https://registry.npmjs.org/@octokit/core/-/core-3.5.1.tgz", + "integrity": "sha512-omncwpLVxMP+GLpLPgeGJBF6IWJFjXDS5flY5VbppePYX9XehevbDykRH9PdCdvqt9TS5AOTiDide7h0qrkHjw==", + "dependencies": { + "@octokit/auth-token": "^2.4.4", + "@octokit/graphql": "^4.5.8", + "@octokit/request": "^5.6.0", + "@octokit/request-error": "^2.0.5", + "@octokit/types": "^6.0.3", + "before-after-hook": "^2.2.0", + "universal-user-agent": "^6.0.0" + } + }, + "node_modules/@octokit/endpoint": { + "version": "6.0.12", + "resolved": "https://registry.npmjs.org/@octokit/endpoint/-/endpoint-6.0.12.tgz", + "integrity": "sha512-lF3puPwkQWGfkMClXb4k/eUT/nZKQfxinRWJrdZaJO85Dqwo/G0yOC434Jr2ojwafWJMYqFGFa5ms4jJUgujdA==", + "dependencies": { + "@octokit/types": "^6.0.3", + "is-plain-object": "^5.0.0", + "universal-user-agent": "^6.0.0" + } + }, + "node_modules/@octokit/graphql": { + "version": "4.8.0", + "resolved": "https://registry.npmjs.org/@octokit/graphql/-/graphql-4.8.0.tgz", + "integrity": "sha512-0gv+qLSBLKF0z8TKaSKTsS39scVKF9dbMxJpj3U0vC7wjNWFuIpL/z76Qe2fiuCbDRcJSavkXsVtMS6/dtQQsg==", + "dependencies": { + "@octokit/request": "^5.6.0", + "@octokit/types": "^6.0.3", + "universal-user-agent": "^6.0.0" + } + }, + "node_modules/@octokit/openapi-types": { + "version": "11.2.0", + "resolved": "https://registry.npmjs.org/@octokit/openapi-types/-/openapi-types-11.2.0.tgz", + "integrity": "sha512-PBsVO+15KSlGmiI8QAzaqvsNlZlrDlyAJYcrXBCvVUxCp7VnXjkwPoFHgjEJXx3WF9BAwkA6nfCUA7i9sODzKA==" + }, + "node_modules/@octokit/plugin-paginate-rest": { + "version": "2.17.0", + "resolved": "https://registry.npmjs.org/@octokit/plugin-paginate-rest/-/plugin-paginate-rest-2.17.0.tgz", + "integrity": "sha512-tzMbrbnam2Mt4AhuyCHvpRkS0oZ5MvwwcQPYGtMv4tUa5kkzG58SVB0fcsLulOZQeRnOgdkZWkRUiyBlh0Bkyw==", + "dependencies": { + "@octokit/types": "^6.34.0" + }, + "peerDependencies": { + "@octokit/core": ">=2" + } + }, + "node_modules/@octokit/plugin-rest-endpoint-methods": { + "version": "5.13.0", + "resolved": "https://registry.npmjs.org/@octokit/plugin-rest-endpoint-methods/-/plugin-rest-endpoint-methods-5.13.0.tgz", + "integrity": "sha512-uJjMTkN1KaOIgNtUPMtIXDOjx6dGYysdIFhgA52x4xSadQCz3b/zJexvITDVpANnfKPW/+E0xkOvLntqMYpviA==", + "dependencies": { + "@octokit/types": "^6.34.0", + "deprecation": "^2.3.1" + }, + "peerDependencies": { + "@octokit/core": ">=3" + } + }, + "node_modules/@octokit/request": { + "version": "5.6.2", + "resolved": "https://registry.npmjs.org/@octokit/request/-/request-5.6.2.tgz", + "integrity": "sha512-je66CvSEVf0jCpRISxkUcCa0UkxmFs6eGDRSbfJtAVwbLH5ceqF+YEyC8lj8ystKyZTy8adWr0qmkY52EfOeLA==", + "dependencies": { + "@octokit/endpoint": "^6.0.1", + "@octokit/request-error": "^2.1.0", + "@octokit/types": "^6.16.1", + "is-plain-object": "^5.0.0", + "node-fetch": "^2.6.1", + "universal-user-agent": "^6.0.0" + } + }, + "node_modules/@octokit/request-error": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@octokit/request-error/-/request-error-2.1.0.tgz", + "integrity": "sha512-1VIvgXxs9WHSjicsRwq8PlR2LR2x6DwsJAaFgzdi0JfJoGSO8mYI/cHJQ+9FbN21aa+DrgNLnwObmyeSC8Rmpg==", + "dependencies": { + "@octokit/types": "^6.0.3", + "deprecation": "^2.0.0", + "once": "^1.4.0" + } + }, + "node_modules/@octokit/types": { + "version": "6.34.0", + "resolved": "https://registry.npmjs.org/@octokit/types/-/types-6.34.0.tgz", + "integrity": "sha512-s1zLBjWhdEI2zwaoSgyOFoKSl109CUcVBCc7biPJ3aAf6LGLU6szDvi31JPU7bxfla2lqfhjbbg/5DdFNxOwHw==", + "dependencies": { + "@octokit/openapi-types": "^11.2.0" + } + }, + "node_modules/@vercel/ncc": { + "version": "0.31.1", + "resolved": "https://registry.npmjs.org/@vercel/ncc/-/ncc-0.31.1.tgz", + "integrity": "sha512-g0FAxwdViI6UzsiVz5HssIHqjcPa1EHL6h+2dcJD893SoCJaGdqqgUF09xnMW6goWnnhbLvgiKlgJWrJa+7qYA==", + "dev": true, + "bin": { + "ncc": "dist/ncc/cli.js" + } + }, + "node_modules/before-after-hook": { + "version": "2.2.2", + "resolved": "https://registry.npmjs.org/before-after-hook/-/before-after-hook-2.2.2.tgz", + "integrity": "sha512-3pZEU3NT5BFUo/AD5ERPWOgQOCZITni6iavr5AUw5AUwQjMlI0kzu5btnyD39AF0gUEsDPwJT+oY1ORBJijPjQ==" + }, + "node_modules/deprecation": { + "version": "2.3.1", + "resolved": "https://registry.npmjs.org/deprecation/-/deprecation-2.3.1.tgz", + "integrity": "sha512-xmHIy4F3scKVwMsQ4WnVaS8bHOx0DmVwRywosKhaILI0ywMDWPtBSku2HNxRvF7jtwDRsoEwYQSfbxj8b7RlJQ==" + }, + "node_modules/is-plain-object": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/is-plain-object/-/is-plain-object-5.0.0.tgz", + "integrity": "sha512-VRSzKkbMm5jMDoKLbltAkFQ5Qr7VDiTFGXxYFXXowVj387GeGNOCsOH6Msy00SGZ3Fp84b1Naa1psqgcCIEP5Q==", + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/moment": { + "version": "2.29.1", + "resolved": "https://registry.npmjs.org/moment/-/moment-2.29.1.tgz", + "integrity": "sha512-kHmoybcPV8Sqy59DwNDY3Jefr64lK/by/da0ViFcuA4DH0vQg5Q6Ze5VimxkfQNSC+Mls/Kx53s7TjP1RhFEDQ==", + "engines": { + "node": "*" + } + }, + "node_modules/node-fetch": { + "version": "2.6.5", + "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.5.tgz", + "integrity": "sha512-mmlIVHJEu5rnIxgEgez6b9GgWXbkZj5YZ7fx+2r94a2E+Uirsp6HsPTPlomfdHtpt/B0cdKviwkoaM6pyvUOpQ==", + "dependencies": { + "whatwg-url": "^5.0.0" + }, + "engines": { + "node": "4.x || >=6.0.0" + } + }, + "node_modules/once": { + "version": "1.4.0", + "resolved": "https://registry.npmjs.org/once/-/once-1.4.0.tgz", + "integrity": "sha1-WDsap3WWHUsROsF9nFC6753Xa9E=", + "dependencies": { + "wrappy": "1" + } + }, + "node_modules/prettier": { + "version": "2.4.1", + "resolved": "https://registry.npmjs.org/prettier/-/prettier-2.4.1.tgz", + "integrity": "sha512-9fbDAXSBcc6Bs1mZrDYb3XKzDLm4EXXL9sC1LqKP5rZkT6KRr/rf9amVUcODVXgguK/isJz0d0hP72WeaKWsvA==", + "dev": true, + "bin": { + "prettier": "bin-prettier.js" + }, + "engines": { + "node": ">=10.13.0" + } + }, + "node_modules/tr46": { + "version": "0.0.3", + "resolved": "https://registry.npmjs.org/tr46/-/tr46-0.0.3.tgz", + "integrity": "sha1-gYT9NH2snNwYWZLzpmIuFLnZq2o=" + }, + "node_modules/tunnel": { + "version": "0.0.6", + "resolved": "https://registry.npmjs.org/tunnel/-/tunnel-0.0.6.tgz", + "integrity": "sha512-1h/Lnq9yajKY2PEbBadPXj3VxsDDu844OnaAo52UVmIzIvwwtBPIuNvkjuzBlTWpfJyUbG3ez0KSBibQkj4ojg==", + "engines": { + "node": ">=0.6.11 <=0.7.0 || >=0.7.3" + } + }, + "node_modules/universal-user-agent": { + "version": "6.0.0", + "resolved": "https://registry.npmjs.org/universal-user-agent/-/universal-user-agent-6.0.0.tgz", + "integrity": "sha512-isyNax3wXoKaulPDZWHQqbmIx1k2tb9fb3GGDBRxCscfYV2Ch7WxPArBsFEG8s/safwXTT7H4QGhaIkTp9447w==" + }, + "node_modules/uuid": { + "version": "3.4.0", + "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz", + "integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A==", + "deprecated": "Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.", + "bin": { + "uuid": "bin/uuid" + } + }, + "node_modules/webidl-conversions": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/webidl-conversions/-/webidl-conversions-3.0.1.tgz", + "integrity": "sha1-JFNCdeKnvGvnvIZhHMFq4KVlSHE=" + }, + "node_modules/whatwg-url": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/whatwg-url/-/whatwg-url-5.0.0.tgz", + "integrity": "sha1-lmRU6HZUYuN2RNNib2dCzotwll0=", + "dependencies": { + "tr46": "~0.0.3", + "webidl-conversions": "^3.0.0" + } + }, + "node_modules/wrappy": { + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/wrappy/-/wrappy-1.0.2.tgz", + "integrity": "sha1-tSQ9jz7BqjXxNkYFvA0QNuMKtp8=" + } + }, + "dependencies": { + "@actions/core": { + "version": "1.6.0", + "resolved": "https://registry.npmjs.org/@actions/core/-/core-1.6.0.tgz", + "integrity": "sha512-NB1UAZomZlCV/LmJqkLhNTqtKfFXJZAUPcfl/zqG7EfsQdeUJtaWO98SGbuQ3pydJ3fHl2CvI/51OKYlCYYcaw==", + "requires": { + "@actions/http-client": "^1.0.11" + } + }, + "@actions/exec": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/@actions/exec/-/exec-1.1.0.tgz", + "integrity": "sha512-LImpN9AY0J1R1mEYJjVJfSZWU4zYOlEcwSTgPve1rFQqK5AwrEs6uWW5Rv70gbDIQIAUwI86z6B+9mPK4w9Sbg==", + "requires": { + "@actions/io": "^1.0.1" + } + }, + "@actions/github": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/@actions/github/-/github-5.0.0.tgz", + "integrity": "sha512-QvE9eAAfEsS+yOOk0cylLBIO/d6WyWIOvsxxzdrPFaud39G6BOkUwScXZn1iBzQzHyu9SBkkLSWlohDWdsasAQ==", + "requires": { + "@actions/http-client": "^1.0.11", + "@octokit/core": "^3.4.0", + "@octokit/plugin-paginate-rest": "^2.13.3", + "@octokit/plugin-rest-endpoint-methods": "^5.1.1" + } + }, + "@actions/http-client": { + "version": "1.0.11", + "resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-1.0.11.tgz", + "integrity": "sha512-VRYHGQV1rqnROJqdMvGUbY/Kn8vriQe/F9HR2AlYHzmKuM/p3kjNuXhmdBfcVgsvRWTz5C5XW5xvndZrVBuAYg==", + "requires": { + "tunnel": "0.0.6" + } + }, + "@actions/io": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/@actions/io/-/io-1.1.1.tgz", + "integrity": "sha512-Qi4JoKXjmE0O67wAOH6y0n26QXhMKMFo7GD/4IXNVcrtLjUlGjGuVys6pQgwF3ArfGTQu0XpqaNr0YhED2RaRA==" + }, + "@actions/tool-cache": { + "version": "1.7.1", + "resolved": "https://registry.npmjs.org/@actions/tool-cache/-/tool-cache-1.7.1.tgz", + "integrity": "sha512-y1xxxOhXaBUIUit3lhepmu/0xdgiTMpnZRLmVdtF0hTm521doi+MdRRRP62czHvM7wxH6epj4JPNJQ3iJpOrkQ==", + "requires": { + "@actions/core": "^1.2.6", + "@actions/exec": "^1.0.0", + "@actions/http-client": "^1.0.8", + "@actions/io": "^1.1.1", + "semver": "^6.1.0", + "uuid": "^3.3.2" + }, + "dependencies": { + "semver": { + "version": "6.3.0", + "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz", + "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw==" + } + } + }, + "@octokit/auth-token": { + "version": "2.5.0", + "resolved": "https://registry.npmjs.org/@octokit/auth-token/-/auth-token-2.5.0.tgz", + "integrity": "sha512-r5FVUJCOLl19AxiuZD2VRZ/ORjp/4IN98Of6YJoJOkY75CIBuYfmiNHGrDwXr+aLGG55igl9QrxX3hbiXlLb+g==", + "requires": { + "@octokit/types": "^6.0.3" + } + }, + "@octokit/core": { + "version": "3.5.1", + "resolved": "https://registry.npmjs.org/@octokit/core/-/core-3.5.1.tgz", + "integrity": "sha512-omncwpLVxMP+GLpLPgeGJBF6IWJFjXDS5flY5VbppePYX9XehevbDykRH9PdCdvqt9TS5AOTiDide7h0qrkHjw==", + "requires": { + "@octokit/auth-token": "^2.4.4", + "@octokit/graphql": "^4.5.8", + "@octokit/request": "^5.6.0", + "@octokit/request-error": "^2.0.5", + "@octokit/types": "^6.0.3", + "before-after-hook": "^2.2.0", + "universal-user-agent": "^6.0.0" + } + }, + "@octokit/endpoint": { + "version": "6.0.12", + "resolved": "https://registry.npmjs.org/@octokit/endpoint/-/endpoint-6.0.12.tgz", + "integrity": "sha512-lF3puPwkQWGfkMClXb4k/eUT/nZKQfxinRWJrdZaJO85Dqwo/G0yOC434Jr2ojwafWJMYqFGFa5ms4jJUgujdA==", + "requires": { + "@octokit/types": "^6.0.3", + "is-plain-object": "^5.0.0", + "universal-user-agent": "^6.0.0" + } + }, + "@octokit/graphql": { + "version": "4.8.0", + "resolved": "https://registry.npmjs.org/@octokit/graphql/-/graphql-4.8.0.tgz", + "integrity": "sha512-0gv+qLSBLKF0z8TKaSKTsS39scVKF9dbMxJpj3U0vC7wjNWFuIpL/z76Qe2fiuCbDRcJSavkXsVtMS6/dtQQsg==", + "requires": { + "@octokit/request": "^5.6.0", + "@octokit/types": "^6.0.3", + "universal-user-agent": "^6.0.0" + } + }, + "@octokit/openapi-types": { + "version": "11.2.0", + "resolved": "https://registry.npmjs.org/@octokit/openapi-types/-/openapi-types-11.2.0.tgz", + "integrity": "sha512-PBsVO+15KSlGmiI8QAzaqvsNlZlrDlyAJYcrXBCvVUxCp7VnXjkwPoFHgjEJXx3WF9BAwkA6nfCUA7i9sODzKA==" + }, + "@octokit/plugin-paginate-rest": { + "version": "2.17.0", + "resolved": "https://registry.npmjs.org/@octokit/plugin-paginate-rest/-/plugin-paginate-rest-2.17.0.tgz", + "integrity": "sha512-tzMbrbnam2Mt4AhuyCHvpRkS0oZ5MvwwcQPYGtMv4tUa5kkzG58SVB0fcsLulOZQeRnOgdkZWkRUiyBlh0Bkyw==", + "requires": { + "@octokit/types": "^6.34.0" + } + }, + "@octokit/plugin-rest-endpoint-methods": { + "version": "5.13.0", + "resolved": "https://registry.npmjs.org/@octokit/plugin-rest-endpoint-methods/-/plugin-rest-endpoint-methods-5.13.0.tgz", + "integrity": "sha512-uJjMTkN1KaOIgNtUPMtIXDOjx6dGYysdIFhgA52x4xSadQCz3b/zJexvITDVpANnfKPW/+E0xkOvLntqMYpviA==", + "requires": { + "@octokit/types": "^6.34.0", + "deprecation": "^2.3.1" + } + }, + "@octokit/request": { + "version": "5.6.2", + "resolved": "https://registry.npmjs.org/@octokit/request/-/request-5.6.2.tgz", + "integrity": "sha512-je66CvSEVf0jCpRISxkUcCa0UkxmFs6eGDRSbfJtAVwbLH5ceqF+YEyC8lj8ystKyZTy8adWr0qmkY52EfOeLA==", + "requires": { + "@octokit/endpoint": "^6.0.1", + "@octokit/request-error": "^2.1.0", + "@octokit/types": "^6.16.1", + "is-plain-object": "^5.0.0", + "node-fetch": "^2.6.1", + "universal-user-agent": "^6.0.0" + } + }, + "@octokit/request-error": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@octokit/request-error/-/request-error-2.1.0.tgz", + "integrity": "sha512-1VIvgXxs9WHSjicsRwq8PlR2LR2x6DwsJAaFgzdi0JfJoGSO8mYI/cHJQ+9FbN21aa+DrgNLnwObmyeSC8Rmpg==", + "requires": { + "@octokit/types": "^6.0.3", + "deprecation": "^2.0.0", + "once": "^1.4.0" + } + }, + "@octokit/types": { + "version": "6.34.0", + "resolved": "https://registry.npmjs.org/@octokit/types/-/types-6.34.0.tgz", + "integrity": "sha512-s1zLBjWhdEI2zwaoSgyOFoKSl109CUcVBCc7biPJ3aAf6LGLU6szDvi31JPU7bxfla2lqfhjbbg/5DdFNxOwHw==", + "requires": { + "@octokit/openapi-types": "^11.2.0" + } + }, + "@vercel/ncc": { + "version": "0.31.1", + "resolved": "https://registry.npmjs.org/@vercel/ncc/-/ncc-0.31.1.tgz", + "integrity": "sha512-g0FAxwdViI6UzsiVz5HssIHqjcPa1EHL6h+2dcJD893SoCJaGdqqgUF09xnMW6goWnnhbLvgiKlgJWrJa+7qYA==", + "dev": true + }, + "before-after-hook": { + "version": "2.2.2", + "resolved": "https://registry.npmjs.org/before-after-hook/-/before-after-hook-2.2.2.tgz", + "integrity": "sha512-3pZEU3NT5BFUo/AD5ERPWOgQOCZITni6iavr5AUw5AUwQjMlI0kzu5btnyD39AF0gUEsDPwJT+oY1ORBJijPjQ==" + }, + "deprecation": { + "version": "2.3.1", + "resolved": "https://registry.npmjs.org/deprecation/-/deprecation-2.3.1.tgz", + "integrity": "sha512-xmHIy4F3scKVwMsQ4WnVaS8bHOx0DmVwRywosKhaILI0ywMDWPtBSku2HNxRvF7jtwDRsoEwYQSfbxj8b7RlJQ==" + }, + "is-plain-object": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/is-plain-object/-/is-plain-object-5.0.0.tgz", + "integrity": "sha512-VRSzKkbMm5jMDoKLbltAkFQ5Qr7VDiTFGXxYFXXowVj387GeGNOCsOH6Msy00SGZ3Fp84b1Naa1psqgcCIEP5Q==" + }, + "moment": { + "version": "2.29.1", + "resolved": "https://registry.npmjs.org/moment/-/moment-2.29.1.tgz", + "integrity": "sha512-kHmoybcPV8Sqy59DwNDY3Jefr64lK/by/da0ViFcuA4DH0vQg5Q6Ze5VimxkfQNSC+Mls/Kx53s7TjP1RhFEDQ==" + }, + "node-fetch": { + "version": "2.6.5", + "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.5.tgz", + "integrity": "sha512-mmlIVHJEu5rnIxgEgez6b9GgWXbkZj5YZ7fx+2r94a2E+Uirsp6HsPTPlomfdHtpt/B0cdKviwkoaM6pyvUOpQ==", + "requires": { + "whatwg-url": "^5.0.0" + } + }, + "once": { + "version": "1.4.0", + "resolved": "https://registry.npmjs.org/once/-/once-1.4.0.tgz", + "integrity": "sha1-WDsap3WWHUsROsF9nFC6753Xa9E=", + "requires": { + "wrappy": "1" + } + }, + "prettier": { + "version": "2.4.1", + "resolved": "https://registry.npmjs.org/prettier/-/prettier-2.4.1.tgz", + "integrity": "sha512-9fbDAXSBcc6Bs1mZrDYb3XKzDLm4EXXL9sC1LqKP5rZkT6KRr/rf9amVUcODVXgguK/isJz0d0hP72WeaKWsvA==", + "dev": true + }, + "tr46": { + "version": "0.0.3", + "resolved": "https://registry.npmjs.org/tr46/-/tr46-0.0.3.tgz", + "integrity": "sha1-gYT9NH2snNwYWZLzpmIuFLnZq2o=" + }, + "tunnel": { + "version": "0.0.6", + "resolved": "https://registry.npmjs.org/tunnel/-/tunnel-0.0.6.tgz", + "integrity": "sha512-1h/Lnq9yajKY2PEbBadPXj3VxsDDu844OnaAo52UVmIzIvwwtBPIuNvkjuzBlTWpfJyUbG3ez0KSBibQkj4ojg==" + }, + "universal-user-agent": { + "version": "6.0.0", + "resolved": "https://registry.npmjs.org/universal-user-agent/-/universal-user-agent-6.0.0.tgz", + "integrity": "sha512-isyNax3wXoKaulPDZWHQqbmIx1k2tb9fb3GGDBRxCscfYV2Ch7WxPArBsFEG8s/safwXTT7H4QGhaIkTp9447w==" + }, + "uuid": { + "version": "3.4.0", + "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz", + "integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A==" + }, + "webidl-conversions": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/webidl-conversions/-/webidl-conversions-3.0.1.tgz", + "integrity": "sha1-JFNCdeKnvGvnvIZhHMFq4KVlSHE=" + }, + "whatwg-url": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/whatwg-url/-/whatwg-url-5.0.0.tgz", + "integrity": "sha1-lmRU6HZUYuN2RNNib2dCzotwll0=", + "requires": { + "tr46": "~0.0.3", + "webidl-conversions": "^3.0.0" + } + }, + "wrappy": { + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/wrappy/-/wrappy-1.0.2.tgz", + "integrity": "sha1-tSQ9jz7BqjXxNkYFvA0QNuMKtp8=" + } + } +} diff --git a/package.json b/package.json new file mode 100644 index 0000000..7a3b060 --- /dev/null +++ b/package.json @@ -0,0 +1,32 @@ +{ + "name": "kics-github-action", + "version": "1.0.0", + "description": "[![License: GPL-3.0](https://img.shields.io/badge/License-GPL3.0-yellow.svg)](https://www.gnu.org/licenses) [![Latest Release](https://img.shields.io/github/v/release/checkmarx/kics-github-action)](https://github.com/checkmarx/kics-github-action/releases) [![Open Issues](https://img.shields.io/github/issues-raw/checkmarx/kics-github-action)](https://github.com/checkmarx/kics-github-action/issues)", + "main": "index.js", + "scripts": { + "build": "ncc build src/main.js", + "format": "prettier --write **/*.ts" + }, + "repository": { + "type": "git", + "url": "git+https://github.com/Checkmarx/kics-github-action.git" + }, + "keywords": [], + "author": "", + "license": "GNU GENERAL PUBLIC LICENSE", + "bugs": { + "url": "https://github.com/Checkmarx/kics-github-action/issues" + }, + "homepage": "https://github.com/Checkmarx/kics-github-action#readme", + "dependencies": { + "@actions/core": "^1.6.0", + "@actions/exec": "^1.1.0", + "@actions/github": "^5.0.0", + "@actions/tool-cache": "^1.7.1", + "moment": "^2.29.1" + }, + "devDependencies": { + "@vercel/ncc": "^0.31.1", + "prettier": "^2.4.1" + } +} \ No newline at end of file diff --git a/positive.tf b/positive.tf new file mode 100644 index 0000000..21eee44 --- /dev/null +++ b/positive.tf @@ -0,0 +1,21 @@ +resource "azurerm_resource_group" "positive1" { + name = "acceptanceTestResourceGroup1" + location = "West US" +} + +resource "azurerm_sql_server" "positive2" { + name = "mysqlserver1" + resource_group_name = "acceptanceTestResourceGroup1" + location = "West US" + version = "12.0" + administrator_login = "4dm1n157r470r" + administrator_login_password = "4-v3ry-53cr37-p455w0rd" +} + +resource "azurerm_sql_active_directory_administrator" "positive3" { + server_name = "mysqlserver2" + resource_group_name = "acceptanceTestResourceGroup1" + login = "sqladmin" + tenant_id = data.azurerm_client_config.current.tenant_id + object_id = data.azurerm_client_config.current.object_id +} diff --git a/results.json b/results.json new file mode 100644 index 0000000..5375d64 --- /dev/null +++ b/results.json @@ -0,0 +1,27008 @@ +{ + "kics_version": "development", + "files_scanned": 843, + "files_parsed": 843, + "files_failed_to_scan": 0, + "queries_total": 91, + "queries_failed_to_execute": 0, + "queries_failed_to_compute_similarity_id": 0, + "scan_id": "console", + "severity_counters": { + "HIGH": 0, + "INFO": 1628, + "LOW": 708, + "MEDIUM": 0, + "TRACE": 62 + }, + "total_counter": 2336, + "total_bom_resources": 62, + "start": "2021-10-12T12:59:43.666198+01:00", + "end": "2021-10-12T12:59:49.056688+01:00", + "paths": [ + "assets/queries/terraform/aws" + ], + "queries": [ + { + "query_name": "ALB Deletion Protection Disabled", + "query_id": "afecd1f1-6378-4f7e-bb3b-60c35801fdd4", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb#enable_deletion_protection", + "severity": "LOW", + "platform": "Terraform", + "category": "Insecure Configurations", + "description": "Application Load Balancer should have deletion protection enabled", + "description_id": "224b3c6f", + "files": [ + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative1.tf", + "similarity_id": "6e41b4c14440fc42d084ec54de37649d7dff0731870ba949cd6e5a7308df0173", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[enabled]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf", + "similarity_id": "0586b1fcf7fc544b156c7f766990df91d44b25e59e367f9847e0be38efae6ef9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf", + "similarity_id": "00c7a5de0048d51284592f915eedcc9b4f3f0acde8c657d8622c9bc97a76ed12", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[disabled_2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/negative.tf", + "similarity_id": "347945dbe47e4dd647bf7069eaef81d45d804976b3663d456e4e876bba2b68d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[foo33]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", + "similarity_id": "8e2c4790ddcf078f5ee3ccda51f61eccef8540d1c248ab17c3fb5aafe0f80434", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[disabled_1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf", + "similarity_id": "1020cc6e107aa3e0f06c7a62da1120481a3ab91e74de9370dc72ce9d5c6a5167", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf", + "similarity_id": "9b8627cd2f542bfc8cd4c46ce61f9f8a3566cff28b186244cfc929ec8d9bbffa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf", + "similarity_id": "79107a63984e85c1e602bf9b2bad95fe737e1f1b3e79d473213ef281f81f03f8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "37bc9fa516485cccd6089a02271256d8afcf2afcf3f8e17ea383631c7556c6f1", + "line": 28, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf", + "similarity_id": "79fe377af1d9a8099b871e93b737e0e49eddaff8f565431ce509e19d4b87d304", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_lb[positive3].enable_deletion_protection", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is set to true", + "actual_value": "'enable_deletion_protection' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf", + "similarity_id": "b5df7b7fa7f7822a7387fb9ee48544ffbe128e24c9871fc0a4a999477746d2cc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[disabled_1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf", + "similarity_id": "f9548e390f291fa2aaf8fe8b9cb58e63ba54a949004008f87c5ee75eb8cb864d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "e1a97baefce0eeb08fbb74630e5bed8f7773d733b83ced9d19b30a38436589e5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", + "similarity_id": "ab2dbfcc0ec7097f3905f2971a280f85d22a09ac3fdf534a29069bf7e6f41ad9", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[disabled_2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", + "similarity_id": "36f76cafe1b909883c7de8d12e50bc280c2b59e189891ec73d382000b8ae06ad", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[disabled_1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf", + "similarity_id": "5605a2534f408e017b591a2b5ca499cd089001f0f1d71dae13e970d309145cb9", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_alb[positive1].enable_deletion_protection", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is set to true", + "actual_value": "'enable_deletion_protection' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf", + "similarity_id": "f41a22332bc00c57fe53adeabed25c7f99b93d89251a1d6ce36a17f22677b273", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test33]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", + "similarity_id": "2e6c1ce04a1d0b42ebdc5020a6ce9b0ac90f37b5b6d72535e22c643cc97a5ec4", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[enabled]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf", + "similarity_id": "a749007a35221207e5f9c8e8a8166a636abf5e54f9370883f41044fa2cdd965d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf", + "similarity_id": "e9445c6f8155c2dacf56f8747bd8feb08cf1addeb801a25e238412ba29e24840", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf", + "similarity_id": "20ac402e382fa0888bae94571a65b0f05c9c721ed031b51eaa8f71c710063215", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test3]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/positive.tf", + "similarity_id": "e28effb6d1c26cd009d583dcb96405be6e9bc2f42aac2bb100d2997314f1b456", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "7b1810d5e9ed391821c0fa2bc5aab8bdaa40ffc9ed1bd362ecd15da6c5446fcb", + "line": 49, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf", + "similarity_id": "637ffc6e1680617cc97ac2479450372317f6df5d5acb2df28ef4cab678f4c1ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf", + "similarity_id": "df08dd37db81ade124c03a36e2b9d4e4eb54a748ad6e68b33b3dbf205df4b7b1", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module[alb].enable_deletion_protection", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is set to true", + "actual_value": "'enable_deletion_protection' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "1830dce5112123f8856e94cf507209143e25443676ec469084ddc37a8f2bce24", + "line": 49, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", + "similarity_id": "6d3061d0d0de149f7e52bcc08629463415e3c0a86989ffe81369400188cf3372", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[disabled_2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", + "similarity_id": "c79eae1b40a57e59fa0e322b919ccc70ea09bcc4422e32c29735aa095b6b6b19", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[enabled]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf", + "similarity_id": "eafafcd9b805eb6442ceb40c1ae54e1e68223a9bc22d397b38a13e540bf46143", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[enabled]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + } + ] + }, + { + "query_name": "API Gateway Deployment Without API Gateway UsagePlan Associated", + "query_id": "b3a59b8e-94a3-403e-b6e2-527abaf12034", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_deployment", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "API Gateway Deployment should have API Gateway UsagePlan defined and associated.", + "description_id": "a5480b6e", + "files": [ + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", + "similarity_id": "315245822a4dc6f97239990f1a8fadee201edb066587086ba3d0ae1aa5e73b49", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[example3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[example3] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[example3] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "e7cad90a71cb564c2a229023b511c18cb3a94117fdc350d3e8d90d129cd340a8", + "line": 38, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[api_gw_deploy]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[api_gw_deploy] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[api_gw_deploy] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "014887ac8a52789a764bbec5ff9c952c0c99622958512a84d85c2090a7c23e99", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "121e5015a86c3ebf9c6c8b0ce0ec2686edcbbf7b1ccfb6bbd7788ebbc0d433ef", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", + "similarity_id": "0557c925f271b9ecb14693a38bd826d755479fcd9a54f20aaa04070c38b619aa", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[example5]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[example5] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[example5] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", + "similarity_id": "fe046182e3c25d5bb59028a62d80d7bfa82f1f2f01334802556b4d4c48ef6405", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[examplee]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[examplee] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[examplee] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", + "similarity_id": "801181d9fc5f41b964e09afb3af9f3f516cb0ffc5bd734ea02ef41bd3b58355c", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[example4]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[example4] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[example4] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + } + ] + }, + { + "query_name": "API Gateway Stage Without API Gateway UsagePlan Associated", + "query_id": "c999cf62-0920-40f8-8dda-0caccd66ed7e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_stage", + "severity": "LOW", + "platform": "Terraform", + "category": "Resource Management", + "description": "API Gateway Stage should have API Gateway UsagePlan defined and associated.", + "description_id": "72d08d94", + "files": [ + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", + "similarity_id": "ba8fafdf15c4fbfc8194b4c709d01e767f5ec665ec35df243593b62b45007231", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf", + "similarity_id": "7290a4d8d2c7bed78dbea097027a0465cdb6f78bfeacc102bd2d10922ac8bbd1", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", + "similarity_id": "30911dee2e97d890162bae4f3896b7eb7f7833a3b4fb9102f76ef6dcee10d743", + "line": 11, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example0]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example0] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example0] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", + "similarity_id": "d025d9988281a2f1f4e12c09e918f8c6f2197cfd3f4303c5f37b9f9fd8d4af7c", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "a17fa417702ebb855c29eac44ecf5dfe9f0a58878bf82f8402dbff64c721aca8", + "line": 72, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[api_gw_stage]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[api_gw_stage] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[api_gw_stage] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", + "similarity_id": "ede6130eace2da0b1b478ba65c005386911acef1ef358a846e5b22b3d67a7b19", + "line": 25, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf", + "similarity_id": "e5fcbba9c9307caa16b33c2e174aff2163e6bfb4d9697eb0301d2c7816617324", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", + "similarity_id": "9dcefcee24bda40bd556195645dd87e4b8a2d76c6b38ad55be3eae13433fa620", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example000]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example000] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example000] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", + "similarity_id": "3278c02e08e01be35d5bdd2e3759d263c62c828e34575336d975961f3acb93ee", + "line": 25, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", + "similarity_id": "d2d56759b8a97d15cb9a54e80e02516c6cc1be6714fa63d00ac6e755d4a37355", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", + "similarity_id": "6c8ecef8f3c058e048123f1a01981e31abf1b8b2785f08d6731b10cc8b8cc437", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example0000]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example0000] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example0000] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "4177c00fe8e290d6685d5f059a2bbbffa018444d9f18cdd3e9767b109a0a4fa9", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf", + "similarity_id": "b574b6f19ca5a42f9d251f0ae4a047aca822bdd1058a53886a0a9c4dd9752395", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", + "similarity_id": "364c3a493b69e6ef422f918abca0ecfecfdc8d2d2a4bb07dad11779e1277d37d", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example00]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example00] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example00] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", + "similarity_id": "82bf61396f5968348529fd295b861b8281cf657c2b9d3880b1bba2982902a1aa", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[postive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[postive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[postive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "fdb3ad0c037b1bf4d9e6b3b9c0331067d78cf75b3b917f7a6027fe5a7f4a2b15", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + } + ] + }, + { + "query_name": "Autoscaling Groups Supply Tags", + "query_id": "ba48df05-eaa1-4d64-905e-4a4b051e7587", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/autoscaling_group#tag-and-tags", + "severity": "LOW", + "platform": "Terraform", + "category": "Availability", + "description": "Autoscaling groups should supply tags to configurate", + "description_id": "83cb6386", + "files": [ + { + "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive2.tf", + "similarity_id": "4b64336cb86910fd3b0ec7df632b9c21325b4cc3cf09b79ed6109a9dc54fe697", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[asg]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' is defined and not null", + "actual_value": "'tags' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf", + "similarity_id": "e4eac97be633ce885a0622e2a8f446dc9c27bd961fdebafa0202475c3c2df8ac", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[bar]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' or 'tag' are defined and not null", + "actual_value": "'tags' and 'tag' are undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf", + "similarity_id": "a9f0a7cb5b3de45f09f331b99d7df70d4ad4984fc647de044421fac9b46ea121", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[bar3]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' or 'tag' are defined and not null", + "actual_value": "'tags' and 'tag' are undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf", + "similarity_id": "e3d2b17430bfcc7aa31ec8cddede4d099f60b4ce56c137c4a06c4b3157d0aacc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' or 'tag' are defined and not null", + "actual_value": "'tags' and 'tag' are undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf", + "similarity_id": "855ccf9d37c241f1f932c3a9497082bec7de9e77618541262116e4dce4892f49", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' or 'tag' are defined and not null", + "actual_value": "'tags' and 'tag' are undefined or null" + } + ] + }, + { + "query_name": "CDN Configuration Is Missing", + "query_id": "1bc367f6-901d-4870-ad0c-71d79762ef52", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution", + "severity": "LOW", + "platform": "Terraform", + "category": "Best Practices", + "description": "Content Delivery Network (CDN) service is used within an AWS account to secure and accelerate the delivery of websites. The use of a CDN can provide a layer of security between your origin content and the destination.", + "description_id": "1b311401", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "a50999b453c2a91e688f200ed03da738eaecf52b045e309fbd8362d9ad020f57", + "line": 11, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudfront_distribution[positive1].enabled", + "search_line": 0, + "search_value": "", + "expected_value": "resource.aws_cloudfront_distribution[positive1].enabled is set to 'true'", + "actual_value": "resource.aws_cloudfront_distribution[positive1].enabled is configured as 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "19c7b053e95a18ffd075c07c51db2befd75a489bff933004a81ff386710ef96d", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "resource.aws_cloudfront_distribution[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "resource.aws_cloudfront_distribution[positive2].origin is defined", + "actual_value": "resource.aws_cloudfront_distribution[positive2].origin is not defined" + } + ] + }, + { + "query_name": "CloudTrail Log File Validation Disabled", + "query_id": "52ffcfa6-6c70-4ea6-8376-d828d3961669", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#enable_log_file_validation", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "CloudTrail log file validation should be enabled", + "description_id": "1d528dfd", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf", + "similarity_id": "a644ff00b637d969d67c1ff91dcd2180accff0bfe3e8857a5a3c25dcbf7711fd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "76336683b96b3742355aa571b6ca0cffe892c99f391d70bc92552d4f7c7fcc50", + "line": 60, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "61d53a9f6fedd7bed8f878030a1fda24e3a81cc70b86b7e88a28298e23cebb4f", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", + "similarity_id": "c7fa60d2f6768a67312d4ebb3f9465c8d9ccccff513e840291b467b747e8c0a4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "8d9b7ccb5c82e7f9905af895b1fa86f25da01bb09ba3a9bc30033c6790e9689f", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", + "similarity_id": "008058f43801fa2b8fa1b92a01cc24b355920d7957090072970c42e09a9d017b", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "db916720db93863f94607917068ec869ac3b500271ea13f854ef32d977f7d1e8", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[example]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[example].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[example].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "ce483994d3ccef6e0ac93fdf809153723d388ce73e29fdb8f9d1fde7469fa0ad", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf", + "similarity_id": "fdd5821e0c98579b4cf5ee75faa7f5e434a6aaf61aa05a65b4b48090e2d2fd86", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf", + "similarity_id": "0011f0ca60acd3ebbc298f6f6104fc924841d9246018fdc9ac265262534f1f04", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "79e3be003184d4c0dc2ff15c32d9b826757c1b7645a286d844911749ba528718", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", + "similarity_id": "b7abb2b55853ff94df0666bb3a67e22f1c8169c749044a3f2b65983d42c76341", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf", + "similarity_id": "75923477f39ba943d5f2649335e245bcfcf85d68630357379d21c9a79db36242", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf", + "similarity_id": "1aa5a74fd5e820cd5efdbaf5399c2d67e240e884ab74c98b9b570ac1f030f712", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf", + "similarity_id": "29f29b9ca0551f596f5a10c202b23d067a1a0f9cab337ea750005d97bc245eec", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "a670b0a5c796f9c50012b8971d72b52ce7ee766020e7752ef25b0eb561bfe57d", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "ee8ce3974034ba131e8ed0fccd9ac5b8c53b9bc60c5d62d8df65857f543fe769", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[example3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[example3].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[example3].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf", + "similarity_id": "db1b16c2d9f79c9c8d68042a82cf6e1872c5a29f6ab155482a9c1dcc3f25f848", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "d0fd62bcc627a4a265dbcf526a93ca11b6a1d60892512ee05dc633f99d4e405c", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf", + "similarity_id": "5e3a274b03e3eb27e9faab53b36703bb57917e05b8695a4deffb06b162798f3f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "15206ad120a03c8fd30ddb618bdbb98012dd6a71d949ecf1a073280d2ed3193b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", + "similarity_id": "ff65a715f530ab65b9ebc3247755baf7b51ff16e7e5f44851bc8b1ec3a40e223", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_cloudtrail[positive2].enable_log_file_validation", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is true", + "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is false" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf", + "similarity_id": "df887b84fdea925c13acd9ae76de9f88cda905b713f4f9286e29e86cdd6a8216", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[example2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[example2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[example2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", + "similarity_id": "6242d5ee925cfc828ac3814c0c30c3ece06bebebda18f581d0fe58b9fda73ce0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + } + ] + }, + { + "query_name": "CloudWatch AWS Config Configuration Changes Alarm Missing", + "query_id": "5b8d7527-de8e-4114-b9dd-9d988f1f418f", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for AWS Config configuration changes", + "description_id": "698457eb", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "28f87bb0f29a1c98757f28b377a63b8314b918e3e975eba584744032c95c2e57", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "2e076476ecf6a3f22f3403f73506d504a9aa9a53db3dcbe75e33baa57313543c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "59b3ec0f7fdd6a31c942cbca94e6a997dfe0e770b5db89bc742842a87d0030ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "074d53bb2102b9871082ade06d2c663285c0f6bb5105a81abeefa0140282df6f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "c94d127e3ed0c1572e0cf28a3cedf2b8fb012b324f9dcb93f3e255039c4caade", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "b62912d4a0d653b3859e256d083f82e889b2e98094fd55a3b76f6be718577c0f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "ccaa6439cd0fcc70434fc1484404cd2a18aa02df306f5ccaf71ebf8ff702f9b3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "9cd4244c2691de9b6ceadd71653340414d841446960942ea2ed470c136807e8d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "c6333e70a3f9835e5e9651674e5c1a800e6cc512d5e4c9fafe2ff0fbccfdd3a2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "ecefc086516cdce3a07e986022ad62b2df13a5e532fd75611d9dde322ba15908", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "b4ca7a986f97b9b166b0123d5ded78f3e475601365e5a049c061856d2142c413", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "b276336bdf94aa4eb10581351004ae6b00b74a1d0fd7545a16bda080e612f944", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "e412e90921de50cfb66b29448c6363e1e62d2ee0fdf27e1409f1e387b4365a81", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "65b4a94cbb3aa115a625e23a2f15ead1e443255c1aca3c2f69b59d6df5715343", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "a834e8872e49b3a752827b6f04ce83c4b87071401563c99fda0990bb99f92b90", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "0d226ae52afd4ce3df7f683f6bd3b23ef90690958379d349d277cac18f442943", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "44f5013ed83bd2ab95752d150a45c3611566646bf021fd9e07635557ff7f33fc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "a6269e470632414562ab4177408397cce637fc6702d293780458439ec7f54599", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "335cc2a7fcb18aefd2d8fb960bf5ad3a38f367499cbb74a6c0962095525fbc26", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "6ae20fa38ff7e1c97c2d046589a45c6b74c1e4cfd2e27feb4cab66204b930a60", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "a21f8539e1028b57564ab81ef706d0f757fd6668c6a2503c89b67d18cdb2a099", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "65a39bf06af3d685acef8c2b4b109951d483c63160ceb4b14ad591f18d2d6b6f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "043a223432dfa607862f178ee01b5de3523b883150f86c3201d48f06625557c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "fcb8555af68319cd26d1cb7269597c11b88b767f61aec40540a8386a9c894061", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "7c1a73d47fe7dcca24abd8250612afc66acfa873198a6e085cebb2808c4ba52c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "5b5e7e1ce37cb5537749613c15002a89b5cf3afe32fc9e5c013009bb47e4b8ab", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "04e9b1ba138b3afb3a1b7957d5745cdff05d32800d951f884db8eb79d4d09193", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "55ccfdb69438e2f921f85d9574a2f1318cddca42240d17edc1598470342539f8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "7cb19bad2001702b2b3a74a1b88fc09380ca5872b07361f9392586a68c6ea32e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "da6c720072286d021cbe6aaa6a86d316971819c43193bb62f0c8b4373e5d4781", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "b93c9b9f92fd3a703e9cd883479625d8a96834b08fc422dd32e8aa3cb0366cfb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "7529218b0891ec78e6d2d0feed8a28804c6d7362af163818a104f8e9a385e497", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "74671108c5a4c16a44d5ddd213aac8335882d66e56fea9f5a7696474f8055c62", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "f12c8016108020ecab5441d6d6c57e5390f0dcc6b34d8e3450c247928f5b6063", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "2c740cc1300c105688774751c276fbd5b850c66fe6bbdb7a5b53c50a55852b76", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "b1ac557a63053a01dfe8b382280a37ca1f71de8d3f640fe82ce274c307a6c609", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "2f39af1c579386638e083768d08dc27669271bb77159056b5fd8c8e978197263", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "1fcc438f115fdcc4c4754acaaf3b8c2e3dc07287500dccb02ef95b71f4cd233d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "02b8f48a29d1c0e79e3a6089b74518dab3065d8bf653ae42a4c030c284029c59", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "b300a1b2d46e4fd672fa8e71a773e10cea6e61f6cba2a2a13690e04c2be3c563", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "f3e520e4560f6259264fa7d38501fc7cab4bf57ed620c9f8cc4686068ea5e4bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "9081c8bef2daa3bf24ae285d9f4d95b3653b80569d293493a63aa23dc87048e6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "fa442d97d2facfbb9435046e640ace7af831b786f82eb492e22b8e6da169deb9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "7e1ed3f47b10346218be2a1dfbb39cf5898f221ebd5412ff339ea76dc0e80c3a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "b6d6912628dd64fda3d1ea8577682bc6d077b371854a23a42101eaef09b45b9c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "274df2558ff5ef7226542716f620e3178781b226ed625c035bdff8a951746f90", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "d8ae9645e2c534b4eaaf76fb7ea2af32775d088b36809660c963766c028bcf39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "f8405e844341b177a1383ebe7b749235ca60b7f03794e34b1f736de35a7ab772", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "9a2adc925423e4ab36d70969ad0a2ca2f12594e9eba011334ae620cca52d6e4a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "0277550cfa8d9f99d9ce3ac56754cf18a58cebeb04279748df8de210d52c30cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "ecc26d71ccc531303fbf652725b25fd84afbdb4b79f248d76ae147e5d8fc5003", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "88b2014ac2f47ac791682cf1c2ca53822d16f19ad6f3dc36661ec01eea55b05d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "4685abb28751888cd15122fa27ee1831636a7da404828faf024befac00e88966", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "a83c37218caccd906f54028f77f80f57c84e3230a390ac238a8a1661c9581677", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "42db9b5953ffd4ce0f43bba9ae43dc47554d7a3030d2df77a3bc68ea0fa9ce27", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "86180f0cd176e1fd3f1e75ac049556dac6016c46ff891fd6081fd0374bf00971", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "7752aa5a9968c1ad337779ea051b4a90c4e14b55f7d948d04ae2b97b6c29cece", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "8d9e5a04a5ba7f75c0b0ce8c5815fdcfe5af2dfe6472403d30fe85ba8ed41f6c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "049693902d84a83a657cb7e204806c9e88c5b57569283dc50648f0d6de07c39e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "55f260444f9b71bfb45f22c8c9d259360fae4cc2679ae7dcedf3d0d860dbb8d4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "1252ead1dc8b9b681b9ec987437bf5dcdf8d73b6621ad11de5276e782da8faf7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "647389548c331aea315d77f17a2ab165dda086d471d294e0e20165f9fba271cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "CloudWatch Changes To NACL Alarm Missing", + "query_id": "0a8e8dc5-b6fc-44fc-b5a1-969ec950f9b0", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for changes to NACL", + "description_id": "0a8e8dc5", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "6903debe27292f8b3c0a424a2597e9be6573dd2cd0aa36fa8f609d48912dbcba", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "485745ba95ec0a8997592fe4f47701ba55225e1b7b694763f2cdb2d9bf173bc5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "249352fc5abd4e080e58c75e6f86388079749c863e45a9ea977c7ee92af10668", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "d93c96fb13ae98878e434649c183d291d26423a361d1d358e2f49ad7795b058f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "65845737215fadc5dd2643d2e8948371b7357d5510a4277e5589df18adfb2f63", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "b92d35e9ded8e4d5ecad815f861f57d208830465e15785a40e449fbf7aa57c07", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "be76d95f00873a3b109046fb88cae8f4f93d356175cbb884fcf716e451cebfdd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "2307e0a5d574326cb23eb9511ccecc35ccdf134d402da6f0950cea9708f24937", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "94f4efaab306065c84eb1c7a9321d7d80254988f1bc7b40fa956e1dcbb9e8552", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "9ae953e7c2a5c4adc7b5ba35f232b0c71774fb74326a594516d16c6a31f5cc6c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "1433a773893e6eab9b5f3641245e35b9c2b48458d19a6cc184ce9fcc82f5a3a2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "9e157e89bfee691e474555ea313473faf0bd400f12c0a7b2c86a11404b83f8bb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "a844b32718ea690fdfd052a25fed490bd355e5aaf2e6cb1fefbbbf15eed09048", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "f9a50789122dfcce1819d1f826db0fd2de1f69ad922b4f01043658a63251a900", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "70b614d2064abcdc579b73ddd4c14539d241e7bd22f65fb2d7d66e3288dca931", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "6323b4c11ea7b1919b4f01d003c81635f415e17bca3be8fa8d4b89b419015f4d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "a7f7e4882e792cdfdbf05bddfb7e23ba51c4838d2b5c1cef1fc88c529b6fb76c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "159d125f26b67eb1859093536e003aa91b0942a199b17811fd5bb4ba66d9976e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "f8b527a9d9be588b6045d24ea1e2d204df7fad8d158f3d1942852784d9c7b571", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "71c4bd33bedaf8b90d98e1fd763d2a221285f1a3d8eae7e6ce80adf4edc62f0b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "7958aee25634b1b364c256b800df93bb8f912ceb42c9eb0fbef45f1749c504cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "05f279e147a429dec1aec7efb2c3b71fcc24bb3533c178fbe5fdcc164cc3f451", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "b714c77fa2f094d9b788b0b01896ff7ef3bdba01611fbebb3b6b098c80b5beb3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "465558f068b5c835eb1f7dcc68bbe5260c4434c283d2ee29f02717d02f2c0c68", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "b281b765980341e64a53da3483b543a1257f16ea3781eb54f786acf9f0ce5805", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "98a798f9e4f69097fdb1f53a2a43e4cf2e259deef094f28faa4ae844b991134d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "2f55fa58ea005a436fbb461a9e29d93d8b48fc41b136dcb19e15f7445ea47363", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "3f65270c622b900fa56da691dc85ad8542053e3f450b0e5eec1afe073dafc38c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "037110ae7740689f8d70973200f808ce3b6df9138fb4704356ac1984a2cea84b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "652229c4fb678aa74cbbdf379ae864e5c9cac99dcd7debc1d7d6277cf64bcaa2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "7a2b1dfd6aaa24a3633d750fde31ecbb6f1f45b8fe0cd40d1843ef1338f5bf01", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "1ff9187a94b9eb1b57a641b399804ed95ec1fa100bc776de6040ff03d2de5ac3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "bf0ac8dcdf6ee7525f7acfee11b66dfdc31b2f59f58a96c26163afdeee105318", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "689986cc262ffd0b41b1ec127317ea1862b4e5712060e492e1343b9bb4b34d96", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "df1ffb23b4fd72edbb9abc58f3cb6a971c69fc9bb0e1feb8fb8d4e1c02c0aea1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "b5cc6bdc84f7c0120c4876348826cdcd0ed29f64d05251de9cbf7526c0086aab", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "12477a036b22810870095fcd2650c3ec463536f7a035caa7446580655379200e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "2672d93331e77df454da295ad66151d5d163fb9c2f9beb9c2ee68627a5ec9b78", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "291299fe4a86c7f6bc03ec8a12bfeff6f0394da259a33ff06649aa9522910897", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "0994a5bbfc9f71c539061df8cfb663bdbc26aff30ca4d96a85046fc47e680522", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "1075895c6e5ca3185b3e7eaa8f67d5b131ddb6021ba901fe4504745c8437eb28", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "5d5c03f6c5810ea5eddde285e6d214b3f96f76c7f6394fcc3c38edf1f00a4c73", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "d5be0cefcc8a54578269bcfa43552d3f786d58d0080173cac06f9cc04958ca5b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "c77a4887f7efc62d54e65bbde23162a68698576fc16307e8483c93eead158152", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "648d6c84aae55e0cf6e43c642c77c539ead27730668166dceca10c2e1b4d7f96", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "834310e001b17c9e3c20b118c28a0cb2af4c75680096b58f75f8a5acd319e517", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "dfdb1caff5bfcf063775e47bc3489fd5d44e1435739e5b587916560afdb72e3b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "dd66f94a42a0e11a06b28d64ef9bacd9ff2c2f4370e75c397aca9e9902a2e603", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "463fa47b5589756f95711cc14ace2b5bbe6735f986ab021434c2fd58388909b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "b3bd5928e92f1a88fd2b79867da95120314d24de8ecd61d0bcac98d9a8914459", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "e9249b9bec36c56155b2a31240e8ce4da6a71583c0795cc43efc7e2f16bbb5b3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "291adb3d12d2527aa0ab1c6352aa4df64aa7bec549385fbf4eded296e1d7e398", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "9aa19a3c50addb7f6e3cd910aa7c0df76b9a95428de4502e189ee9cddd0bc00d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "6764112c98ed214c8fafa07c98f78e8361672d7d8d02e4d2278732cde894aa30", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "feb61d9212b82c4f0a8b26ce2a6732e338bfb30b7ae0958e219a415ab131cc9a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "ba017180f52f3205ac4a95a0dccb8d9ef7b9e91f465136c5020b92f87b67ae60", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "b2046312cd53cb96dbc6e4f03e68813cdb3e45033fc4396e71d50070f65418fe", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "ade7006ffbdddf8a86374dcd4f9e6ba5e6ada45d6680263004f9f458988a2d44", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "d672914d3abe349fae6f44fce8e3207696137b0ef7253fa26456793024f9a399", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "cc69dffa94d82474ed937d70bd84582846c69aea8eb156a0de3e836e4e90da58", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "91a5667d72ba097455047c306e8f1c3fc15aef712396476eb8027a2c12b481cc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "be22f6deefaa0648c755ac4d9df6b693552676b562cdfc0444577f717b75952d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "CloudWatch Network Gateways Changes Alarm Missing", + "query_id": "6b6874fe-4c2f-4eea-8b90-7cceaa4a125e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for network gateways changes", + "description_id": "aa3e331d", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "3b23051ef50faeb0b44ffe056697c4f9534cfe36ee95a797a6dcfaaca11b65d3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "72eb98c2d2e83856ebc61685892701facaeaf3333a68601d8801d8798585300e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "336eeb58d45806d01927fa831e1e6438b6105a8d1205bfa2edf979b634e61be3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "6948b44813ff70d53b626d93cda53332f572be68cfcfd3ae54a863a7a49a0279", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "f156927b8f94fed6c5d07af2620a53c278441cb1c66e9862b687d8d40abb4285", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "b70fa2bf38bf27c514359c6c451b902be1a348f27688fa6953b6ac537050a793", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "58ac88b9422f86def946c1cce50cee5e86287d88a3ff0e00623dac784a3dbda2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "3b0d523a12cbceffaa4b2e933ed1dc37601a5c2c2ae5ab9af6f04667618a3a85", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "5f041053857cadb0774e8e8e1fa83001df3b204fd5227542925f3d666fd34ce7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "401d4110b6d1657a4db7bfd73f5b33be2cfac98f346667611ab3183e561e391a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "c93f9e28643027830395e95a6e1ec88523c65ae458de2b5d91d372e5f0fa398c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "5fc1cecfaa01a5ba4319bc40f74126209c5f6359c311598b59d4897eb035818f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "74e8c7a5f913805c1c3120cb8ca323b683ad3911acc7e136aca206ba88eb9d10", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "41a04c0d0892ac538682268f35850eca087895a6de3651b0b5c59b5abfbea6d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "200a8bf334ca6bd48a2cb467bd12457dfe5293079963e67df042f3b562a23ee1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "c142860e6a4720f16956d9089f7335eeb38aff66e9909f2752b36ed7a5cca024", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "874bdfeb4d4c377caad144c24759530aeb9c868e05d9c0395c39cc29788abc21", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "dd840fdc51271dbc29fc6d639f68c8b917687726f23f5568ee9e5fe6830f4e82", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "728fbe9f99d91aadffd4a604026001f54e54afb2f8eb907182d5e5c9ae1801d3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "28be4d164a460322039b32ae22839e3e05239d3384eab3274c53e982b2ea642f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "bdc8427bfbcaf28d8056c0dde93ab3e61f271a93c1fd82286030764f37a11009", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "bb9e798bc79c461d373bf3495826e6d2cf3758a76e83b8d73452dffacced96b6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "632002730849b6dde19e1f95fcedae79fe2b446fd9fe6467fb992c23dad07e40", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "c1ac16b479874f7eb9750f0c4c03848f7dbb2fff563581a3650de74a533795e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "ac42875da20a5dca32ca257af03c8ddd776bf2d40904f6a730220082933d3f68", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "d447febd06bd32d027b3116466b5e41f4d26975a305b0a8d91afd0ae3eeb10f5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "09f83dc75b82b907d540ba959a3241d2cdc5a9609f59fd95c85d1cb49c4ceaa1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "42a0056bf2810b9f2f23926da45240d646f39dc848e218169fe3554368d36e1f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "7cbd47b5e6bac6df1e7cd8aa2556dc977381dea6c222cafa19f28f96b0694944", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "910ca628294f24f35e935b83e45a9bed21d8dc0df1c648688147f2d5096d63d2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "385f84c9a828eefb9866de2d4ba6c159e2694ed1550a709b05270aa89d9e8d77", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "fcc6c07f8ad7d0d415d6d37c584bc0c1857c4b92e2f1f8d90019736b86042a21", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "665038c4b61988f3c75cb397c06946d787823eff54afa9247e2a87e4d790479f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "8fa4184becce81c1a8712a8424fccbb2209cc32c499b0760be24ab6b7bc36c8b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "b57e7f711e5288c7e68bb748f25ed7ee1c18dad137ddc4700276fbbae4d9509c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "c1dacad7a3b1e22ae90cee4a9acb7b6200d3dda20aded774a0cae23b4cc2c6b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "c9133dba00e783e02621aab9ae721e38c5e2feaa5d023505807b690a8f78738f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "951ecb0bcb86b80de8e2535813e4060a14279914f3d789b4249dc1c569d62f67", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "b945f43cfa089d8ad757d1fc3df7994c9a14023c81e5675df6399276f1e73419", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "85f0cbca7d629baf95da3463a31d11dfa3da24ab7e3899192082661db11cdc48", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "65611ed109b8c52fed5f6ab3c242be0dd510c9fa8a8540ea8c5c7c1c465810ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "f8cec98b168eecb15f2d691010096a785e33ce6a52dc8ff678a26054b47a59c9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "edabe700b3bad1be302d6fd547c8f137d44947a8030c21d8b83f88c9a9427997", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "c2f89b882f00d3a20fe3181e881758dbdcb5ddd94a4b5f2db2e83542b992b55c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "b44d3211e8ac140ad48b30f1406a07c08f6d5288793756d35fcadf2f8e9fb4f9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "e827f68c19ff9a19243d5f79dce8781505fc34232c31f6eca43071bf4a39aca2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "5294b0970d4ee5046af4bba0608fb620c24a593c168205fdda84100c6980a7d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "869bb74e042641698a9e7df1675f5903207e1d588ee5babafa72a573e07a9516", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "4a53fcad0c85593ef2bfbe82526e4e172307ea6be50bea5f247f0a6da6f73973", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "6f3127d45094652a171a0cbf10819d296645397d4b641f57fd5535920c365408", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "e5cf9d34b2f053c7a473a6a9fba41d29f512a46e70020b5447558ca25e911851", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "e1e179f493fbfd9c7017ef570dd253f1f8fe9336962af467a925ba875b1e3075", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "5dcb6d07e329415a468aed124837a2bc32033b9a0d0ecf204d41788dcae893ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "a72df7df02e361991c3a2e11969dc6e1aac724bcd165e201c13be1f563171596", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "36e1ba47ebd74af7a70aae8b49f7afb2702b9d1159e394fc8db8d58d521b4b59", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "84a55b5f1ca8ff66610cf824cb204d5e23484c0166152fc60df88f7674da131f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "ad248dd8fc79b68eaa1ab978d53ddb62242a937fb0a91d57a5365a2468a97d83", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "b7a4fa2b37836d1d5a6bc6406e4ead9f195fc71a15e25af3e36d209c023d4de2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "66bf5935a275d3549a384506e7907a773410fb137ed7a99746c048a889e8ef0d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "b11a7784b2e4e061be0bc6bf6d010fee5af6f0834d07e2dfc0c6fa8a18763d42", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "4270ec6885597c3b4eaa91a0e1718b92a380c2be79d674745d04bed83737a536", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "264d50985cfee37b425d82f87e07d904a6f0df08fbfca0f1fd2ac4173d3918c5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "CloudWatch Route Table Changes Alarm Missing", + "query_id": "2285e608-ddbc-47f3-ba54-ce7121e31216", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for route table changes", + "description_id": "de601959", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "5f4de854b65c2f67683eaac8f6780fa56fb102c267982ce4280f2c30a7910c89", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "3fc8da94a2be9d30ca3cb2f03a6451d5523aaa373521d041e81b29c1889168d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "8d5792151098a66a1aa429d7ad4a3f69a7d531f30319a36de2acd80d22b6ba03", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "9b6417e4e20eacd7ef4ca63399721bcfcb618825881856e250cf1761294ce887", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "744004275ac12a397e73ad98b64a5cd8c3b9ff618d9a1d4271225e8d02af2cd6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "9010c5d88f95cf61813737a6be3c2343ec1f8e9312edb0fa5e251c5274660ead", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "fcca10ec92cb5db4284e2ec27e6d37a41193111579754c5b369531c563fd8f86", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "dc2ec4c61a39af10312fa4204c06967c8752eb128e0a7efd34ea8eee8b84af6d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "e85ee6b2c7910d2b1e16daef14afd4327a9e7c227f5cf692b59cede6b8e3bb45", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "4408b8fe65e29d894f70352519bcbec360cb750aca4c70480be652167ebc4a75", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "299cfb68d22bef4f83c848a7a4b94304b55a164b3ff29d3bb68a16de33586c6e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f3f91fa8fbfd3392008c6862290df9f83c645e81667dc99ffb6195f78ac2ebe0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "818879350d986f73b41becddc585d19bc13b2f6fb78a2997d81c7ba2bcf252d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "ce09dc668248c96186d24abf7905f43e53e0852feb4cd52ca5577d9a72713c84", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "fbff85124c847bf9a5a6cfb847ac2a2cdcee5a7e825e245479504d18d3bf526c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "8768dfa6fd9811f173cfb1db02dd8dfbf1fe6b48af944d6b72f6766fb25f1ecb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "408fbeb6c77dfa85b16efc3671db86f145a24c09266370a0148738515768cd18", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "43479d6fea094c3a706b398ec57d24ac7fdde35bb06a69e762a4822ae4649559", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "a5154b5e8653743c074ead09516866dcde8e4799ea6cbc44b3d5a2b0057be7ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "a898a7ef8fa71f4da5408b8ad7c78af82528fdbb5c1d44e9d6decdf686bfe102", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "bb67d5d84aab9dafa4b197421386056f13c14b4e6f329b52866157eff061e52d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "382a860570bc6cba4f8eb326c4046c1477bb1708c31afa90afdd32c2a99571fa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "c51474f8a7f6853d09b919fc90a88d48fb8b23def94f563c306623f043af7f54", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "09a16093c3109ee2cff2c98b289325cd8036fb8fc2602c21b1d7bd761fd97550", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "68b9a7df12ce98bb30c54a92eab0424eec55074c704d5d6de565dfbed90f52a2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "d573532eb89d2ddf8a48a7f221f7dac0e5ac26264a33a31f7631152c4c593abf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "3f9dae31110032114c585de5b64363a1c91afa6fec91f56e4ae8c2ea7b444c16", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "8fe37bf227ce3525cd879f89a31a02ea131a25d682b9659205dc0da19992001a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "1346d996ef997a03fbab68e90c6b3a56a324e52af6898509c4fd478888f2752e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "7521c790f8078a7cb377623e783f103d392dfa5fc911e066f989f7ca56ec1c4b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "782615d3c12204944dd01793feb71678fcf038a50d61382f0039be4a0a5a8faa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "58f395815f35e5edeebe7c8ad1bcbcb96a7ad1b43e0805e04f047510f6ebb95c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "54cb927716e2e78f8abe277f1b63e1f261a3b53096935b1394aa5e062af28a90", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "7f2d6e125af065b98c1706512f9592821638c70f7f3193dd45e83d5c58429bd3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "bfc011b73cba3e2415398c442629aeeb3feb435e7757e27d72a24ca43ab56b80", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "85807e5bd8ae70da946d69b52883008be232c84536f9ba7abae56a35b214152c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "4a824d05364ddcfffb9f1519ef230759527e14564a9364f1f95d8957ebc893d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "8304bb77d73cb94b7dab02387d5f72a42d396a0ea3810b72124dd3e1ea6ad816", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "8a5abde40e2c5082485b9aa07bf9790d7bfc79574fafdd933c19722520cf9522", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "42dbe9c5904dbb08473cd0e66b2c31e3e4efd2aa24f78751eb5f38d9ad46ec74", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "274c213fe5ba284dfe630b901b949ffbc3f5e57c025dd608da1e5f11a47a72ef", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "b6dcb9d5dedf19bdaff7106a5b11c0a2a13afb11240e32247d28afc5818939cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "3e35a47d4d4d42ff76ea022597476a247967de21f9059c90d00d3e43bd6992be", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "18c17b09f2aea09de7ab2490d8276d36cae7e80f12f7dc248ca1266265662652", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "0dc872dd2c1e46d3532c5031ed8bfb552987ea3001b8e9ade07d726cd00fc26b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "b478f7cc1cfb08f95ff8b2248e9f0072844fcb876ee7f7cd8a452c7f13fde6b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "d418fd73f9e54cd84b5a3861e394348803c5d41935952217d825b9b3beac632e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "24ec9eb2d1b4d2ffb0d4bff6e140b603321fccd840b471ca893b98f2323cd7e3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "c31cd39b7fe08018896cea9dd4abd72fd25f1f10102cd02795827958f562b394", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "9a7a046f057673c9ee9d61cffc4082d8f5f2880b233ebabe0f73b4fc1d746842", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "fbd3e216c154ed0b7d4ef71c6ce0f83fcb9d468c44fc32e61252dbd1cc8a0bdb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "ddcb2be72c6172120455bae21d1a2df73c56337aacd35829917da6351b4b416d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "7d6b5e8b4c7205adb3debafafbe424a43664e9270d98b2333d91d50cc357161d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "be7e0430dd9d7d8cda1fd68465f958c6fa08f92cc543c60c506ed98c1ae93806", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "4e8ac4f969157ba544337ae63db2b05c54ae32f709aacf4ab2e4c84dc79fc542", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "a2845656a46d520d08f05cca7d4e18edf5122da36d648e7f26562f48fb6d1d49", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "c8d228540fd790bc85d4631b3fad2d576112bd40856901e80487aeaeb6b3c4ce", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "16ff25fe1c0d12c809b2513f66e868295448666c1998aa44a5e288b16578e77d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "35b04d8a9f78ff67b42b747ee870db727dac015805c7b4f6e6bc730d09731321", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "9b7d2bdcc84f0d91ee7e17a1631e4282954f1e92381283b7806bfcd120bd80a3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "08bdd5f12695ad3fa4c759e50f952c0264ef5a264f807f8a01d730b8b061fbb1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "9c8ba3055a2aa1d520fd5dc051b959e8d4451b078fc05e8b10a52bcc1c1f9cc4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "CloudWatch VPC Changes Alarm Missing", + "query_id": "9d0d4512-1959-43a2-a17f-72360ff06d1b", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for VPC changes", + "description_id": "6159556d", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "f78c4387e5a3d3c800b90bb179938fa2a00a902a2b6d141629d6710a1a15a3c5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "3eb6be622cd81951dd69546d846297283a8048094af0c466a96999e4268dd310", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "9b12d1e66bc898859bd8d6ca5f91ce8d4c180f298b59708c4a0b90219c565d15", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "93929468076cef9bc2dd1f31dfcf1fcf4407a88c1e2b5b09e9257ef60e9529a1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "aabf760db73489e89f5a362d649bbdaafd55c508c2d61bfcdde07a18da5d6c01", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "fc1773e959a8190b2cd1750a833864aa436600d8c0805ee124d481e7c80ff8ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "235ef3c222b16c81d2f1a5b501b998f69d3e8f8e744e828eb58d97c295e52d01", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "71eb4314bc802ecd15f9a58b153e157bb2fe946c263a17a85d5049104aa80ed2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "8075e728d058c0f7f98cb65180beef6636fb788339c58b9699de5c2b76b89705", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "e57d99f09101aa8733a3fcf31c3238c3ac965e13e60c218c808c9bfecd78066b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "62b3b1f39ef150054e8576d5acb9529b1fdecc921a0533c2d4fdfb1a90b1e3f3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "f7f31cd7837eb069c7840749615ce89c4c72a8b3bd7c81a7f3b570abdd91a3aa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "41e1a5a2b98d81369f7266fa736ac8cc4fe4a1f0db99ee2cfa9664eced06df39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "43da36605491c399f3d009e25bf77db4572ba20c84825b0b296bbe145f8d6d3b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "ca4fb6a5313179fad4fd8afd7a7f467a16f4294ad86b47d17aec972127406788", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "30a647a4997f43851b5e73006547a61a7df8f601850feb1e2812ddf23c498acb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "1f1fdf2736d9401518c6705556d366a07ecff33e4d220715dd1a1017084ee8cf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "d87dff25ea446205eff3bce27baa6083ba82d8a7c283ae9c7aff4f0c15ab0382", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "2d8cb2554affefc7fadaedc282082eb5e12fb635c0dafcb59604355f4e74374a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "f5495de9230c5ad8adccfa79a3f05b27904720b95d2f92a451d356ef856bd5b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "b2dc1cadcc721c30bdd3bd331105f6f10b58177a8dc0cc5a6d3ebe497468aa0e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "8bdea07bfec18400f9f5606ff8c51d4e5205d43cd92341a8c67098d6053d0eda", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "ed47ae20c9b65e049849d6de52d8c98eed9e56cfd5d2543c30ad8fb1d9adb59a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "ed19fd4ba86ee48e3e331b7c7a84a32c69b3c066e89ce86a55e7c2d9ea1a48b7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "3c6a380b65379e454579905cb146839aec504dc65851ca38e0ee4f28a5682403", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "8a11c75c62da0b3e476b15fa285b6e9ab0ab15d7c09ea87c3e8e917c48fe4974", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "1677ff343f734c85312f5271b3b458f8ab35cb5c180cfae65b0a715c7d657b74", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "82bd442524d21326497c31080dfec42cd908fb679e3e4f446ed3b46c07c6ca43", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "5035d36d56444f548960427a10a0b8e19ef36d58c643d75ec907ad4ae0bce75b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "154d640130fa237b2a736372e9e435563e38420c126b43274ed973dcbe8495c0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "72df2ec0c46e40447b2d415f559521b078753f15a77d322688d24c05583810d7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f8c4b0583d63bb7e1003c39946bb1dee502782d2234c4ebe636784513c2a439a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "0b9cb397e700c0bae275fd6cc0e3a07ebc180761bdf245eeef8d8da348b5519a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "b9ce2007d1ef3f76125e7a6e1fa34712e959a18be2f616089801cc0223c9a33a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "771c92742ecb061b7622dd5a00e156b5336339276bc0a28944e4cffe6328f9ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "abe8f41d49fac229bdf379fad6145ba95a8ab80a6a841c63e36633d23587c0e5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "19104bd661e8e1a4be741f6db3c057c4d105929dd01d6e652f481af71ba29972", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "98d62797501e521825edd8fd730c8bb014cb23d6c10ef0e93ff1e9ea518e2324", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "68cc9c5e7d311b50531816623bfc2ff99d5e1cda0df1ddee7c3ebc19a73c4cdc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "7a1ec01d5ad2f9c26989664f0dbbc6d0995a015d78192e568f29265eabd8a0e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "bb5bccf311faeb93a7231f345e83f4a8cbeaa9a502bf5fe09a68520dfdb941cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "d3ff8a30e1a04eebef8b36665c016818c403661f1f450fd89d4af4f030179826", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "3ed651176f008e3fcfcc3b0b44475b6162818db767d56f9757a745a78553d0ac", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "6921930607adf03a8fb84dafaa23cf6e4f01b644538b419d56f4be6da4499e61", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "5f63a8330663349641ae2ba4717ff116c26798b2c2099f2e2a6a3c30f3445cb0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "ea9794bc190133c33f31e2961690fa5369a79e9c98693924f419682d2416d10a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "f8409fef601d328265f9c8595d78f3697966b327198543e1dfe74e564f0f09da", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "4de7ec03f90a1a0ab5c4dc30fca41900429e65318542032631370079069da1b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "4d3548f002c256cb97d6edbcce6c838f53c1c0b959fb32f682a7a262a9e3f837", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "e59fbbaa754ac18e15835af9cc0f983ca3ad6231f9737794f38e8902179c9dc4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "856cd1946e9fffd710aa6544894cf316e7ba68ffe28474326674df86862d18e8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "f02c446f87b5dcb41cfdae80cbad8a1002a652a235976efedb06811c07e4f711", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "28b6b122ca98316681a2ca6434b10b82a3fab327214faa7140426637adf89443", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "f247aa47069ccfe50fce9945e4efa95a157e8c3cf087612ee11458c0a9ddf49d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "933ae9755689363c0ac942297991008be76f532c4f8d67e4514deac1ebf6815c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "d9ea1dbad6228d3ff28802bb4c4befd739ff5bb6b224200420201fb77746777c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "307cbc80158aedd51634508b0b9f661610131d2ccf5c1621e22951fc3ea2c3d3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "0c845d82315f1b992b49ff4940d80377bc165f2c19073e459b9242e532e7b9ba", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "3809462c9f6aa7145329e83e7ae4660c86181907e963802f4762ef092f001450", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "84f8c06f130b93e09dd4785ae74f25512999582d1781a3551da76ba32df96c21", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "c5e252fc71a3990d7f0bc27b8cba855f26a20389fbf0f5890088d66d69c4b2cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "017ab77d147cfe88489aa58ae9a12e14fc69176d5347d483c9f5c3dd2f2cf29c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "Cloudfront Without WAF", + "query_id": "1419b4c6-6d5c-4534-9cf6-6a5266085333", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution", + "severity": "LOW", + "platform": "Terraform", + "category": "Networking and Firewall", + "description": "All AWS CloudFront distributions should be integrated with the Web Application Firewall (AWS WAF) service", + "description_id": "8fa5ef1b", + "files": [ + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "614ba989c920734697749e1246a49e9b09d9db8eaaead0134c48035869e6fced", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive3].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf", + "similarity_id": "74e5b1ac6610157f9753860776e3f2bb26aae3d70ffebd5c978f7409c412dc30", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf", + "similarity_id": "8fd5d3f1e64c52c665b91ce0ad5c24b1c2d45cc2f59e6689228e64bb22e9a50a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", + "similarity_id": "e61ce49e54b2e99fff2e4d13dec99fbe9f0119c03c3bc1bb122f225e5a02ba16", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "94ce01e7edb2ddddd7727bd1e8b7a4e8d026685da1e2fcb525c4b77eacd2433a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf", + "similarity_id": "637892cd770753a39b05f680e94569adb73dd3880e475c7534cc35ddb4413238", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf", + "similarity_id": "11112b047d2b794a69d3d92b67d95448f58c3ee5ef592304d70eac0f70bea1cf", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_waf/test/positive.tf", + "similarity_id": "e54b8771b654e3506c1649c60d713aeaeb0cb20d50dc8f79cdbfa23f647436b1", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf", + "similarity_id": "3c97a44d4372669f0bb1ade1e55e160643edcc4544c26a6e3baf6cfb0708c45a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "0ed44be96870c83d8f3ff83f0ed56b2cb50a221cf7383abc70b6f41a7ee121f1", + "line": 93, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive4].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "f69b0a30cb7cd2aa05cf24afba01584fdd00ea4d6d83b9123e7590b861bb8ff7", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "decdc872d4373042167414f3eb04e440954c03da7a00298ce1ee45d639f5e943", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", + "similarity_id": "dab7339ffcedf08d0a9f9c035892fb47e421ff6a49ff842ea019c403eb76c012", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", + "similarity_id": "2890871bf4c747cfe2a40230381fd3fc41f94e714278da51418138604a2dbad3", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "b57fcbc3947500adb08854118b601a4fd53312e5bf71d4f3ab5ab04f9e406970", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "c24f3424dcf5440647d32ca99826c718099f0387d6df2a9e5a9b2e585407025e", + "line": 52, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive3].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "3a1fea1ab92c64433b9744422188808531d5d557758d5c3104ea89a1cd6a6efb", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive5].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "0b651b88654cdeb77c694c5d866fbcfd70e486fc7790e1373c76aa5032205ecf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", + "similarity_id": "651aaca58a1616f445eadc407753e6f5ee3234622043dbc2909e4d87aafbf1ee", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "ea2436a00b727f768b593c8066f78f12ec11ca02aa507a9cccf5a4d51104264b", + "line": 24, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf", + "similarity_id": "89b11af93e7499b0fdef7ab3b7dc499646c39536dd9ba00131fa1cc95626b97a", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf", + "similarity_id": "ee07c0db46cda988efc438b430114a881c47629ef376a0050bf7e86104641e57", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "c197cc682669f747680473fc43f47c02634c6f4b04bfde2ed97fd9dd30d7de15", + "line": 80, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive4].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + } + ] + }, + { + "query_name": "DocDB Logging Is Disabled", + "query_id": "56f6a008-1b14-4af4-b9b2-ab7cf7e27641", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/docdb_cluster#enabled_cloudwatch_logs_exports", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "DocDB logging should be enabled", + "description_id": "7a864a61", + "files": [ + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "8f12796b960e04e4f65cf18cf8cc84471173946efac2720160c616a69e74910e", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "874f5afbad57a39b95efd136528556452f0f9dbb9958976dcdc2a67a884f4723", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf", + "similarity_id": "45a315e81ffcef96e753ab25c26e9683775bf58e89fbfe041d4a2ace5bfeabd1", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_docdb_cluster[{{positive3}}].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: audit" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf", + "similarity_id": "98893f97db03b6aad45ffa7ae146dad1a7351000186f08255c2461ccb17c40b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf", + "similarity_id": "61cb676a01e8f49da419c2dcc14c68da0bbc4f4bcaa5bb6ddf0f9a281c7d0977", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf", + "similarity_id": "859e9b8b1bb4442c840d58a5f63358a5cc363ec4dd44f99b377e99e99f60601b", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_docdb_cluster[{{positive2}}].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is empty" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf", + "similarity_id": "2e78978fbab4c93daa78087d6e937893d52cac0c3c626db8dcb10dbfd4a244b8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "8ecbd41282330a2ab81733ee362b72448ce57bd6cc3d0e4236fc03505f96ba4c", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{test22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "756b22ceb308d139e2080fa707269acd4e4b9a90219039a8254d47722018c707", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf", + "similarity_id": "bc3f1b2c18ca435da800633338d7d4cb48a7e4ef20c9fdfbb4aef26b71322fa4", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_docdb_cluster[{{positive4}}].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: profiler" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf", + "similarity_id": "38b3732e02cd499832a6b29818dae2aa145c4ccfa32321925deec5ff43495b62", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + } + ] + }, + { + "query_name": "EC2 Instance Using API Keys", + "query_id": "0b93729a-d882-4803-bdc3-ac429a21f158", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#iam_instance_profile", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "EC2 instances should use roles to be granted access to other AWS services", + "description_id": "ffd8ce80", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "3b9048ec403ca5568afcd7009c62f7818c33de5e3c54bbbc22ebe70b03008213", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[positive9].provisioner", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive9].provisioner.remote-exec is being used to configure AWS API keys", + "actual_value": "aws_instance[positive9] should be using iam_instance_profile to assign a role with permissions" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "1d31d8fd477624e1b2bec35b5f2dbdb2e0a2952d6932d97c9e5accc7e1dc6ac6", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive4] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive4].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "8b960cbb8314ac6223873176945424304c4bdf8895a46b3c6ed31bc27e20c582", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[negative1] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[negative1].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "217c237e4fedb4f26901ac634a77fa3f5a038f77e281e20262c4227a375f5246", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive5]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive5] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive5].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", + "similarity_id": "b25dc52221b54a4d444722c6c1426ea2600b883e3a8902d2103b0ad67cd7fb39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "f0b088791ecd7665268128f96ce073fe3bf5770caf641d632f5a919cd72bbaae", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive3] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive3].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "66a635b9822727e7f632d75ecaa2e8f433f02707a34b66803d159d83d8c3af23", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "2a04a674a6521a4d42415d33d3c4dfa5da68ae752bf96e7e6d63961ed032cd02", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "84d74e39b8bfa3b2d7126265dcd281d632737137db2309bd687414473a055f76", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "06b2706778746d1f6a328132e6c8b0d7a591d5e3b7095a553b5f48954e7ede4a", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[positive7].provisioner", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive7].provisioner.remote-exec is being used to configure AWS API keys", + "actual_value": "aws_instance[positive7] should be using iam_instance_profile to assign a role with permissions" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "7cbad8835bcf7c1a276767bfb2f12ecc7c4a82821becc219509a56941c184161", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive2] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive2].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "e172b01cb18ce6733142f2b15df47b8abadc50dd7049712f835b5d4cb8758411", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[positive8].provisioner", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive8].provisioner.file is being used to configure AWS API keys", + "actual_value": "aws_instance[positive8] should be using iam_instance_profile to assign a role with permissions" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", + "similarity_id": "510a8aba1db8ca85d154d119507f1071ca6d17f53c55920ff20152ec51674cc6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", + "similarity_id": "239ad16a6d0ec2682d109bf01a62eee515b0f6402dc6a645e55acb33c022d54d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "4d02e13e7176172a01c31ebe82649c010717abf870eb661d2497a6641ae161ab", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive6]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive6] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive6].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", + "similarity_id": "50259ca980dd7c2fcdb79a83a03b8b0664db76b63e673184508bbc2b24df3a79", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + } + ] + }, + { + "query_name": "ECR Repository Without Policy", + "query_id": "69e7c320-b65d-41bb-be02-d63ecc0bcc9d", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository_policy", + "severity": "LOW", + "platform": "Terraform", + "category": "Best Practices", + "description": "ECR Repository should have Policies attached to it", + "description_id": "cb9636f6", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf", + "similarity_id": "61f8661cbfe9003245484573a2b55043d4746658682994710279d0012ae554bc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo] has policies attached", + "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", + "similarity_id": "fcfc88f5d76e524fe25d71598bcd01ec6e7c8e22c325d32e5f1e2e074223810c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo2] has policies attached", + "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf", + "similarity_id": "eecb04681d7dbe9dda52097a1f00e2ad386f4d087eeb0158379b08748bf2a8ba", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo] has policies attached", + "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf", + "similarity_id": "7eab93cb1a5b09b51350948962465e8b963389e244438fcc02ea3a88510c255a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[negative1] has policies attached", + "actual_value": "aws_ecr_repository[negative1] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf", + "similarity_id": "76cc7a9461ccae1d77aabc54d2144139a0b701363a0072ff1672d0f293f9f76b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo2] has policies attached", + "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", + "similarity_id": "ab39e455167805805c4cdb1f557862c901655f74dfc3b59e8e1cfcbaae11a2df", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[positive2] has policies attached", + "actual_value": "aws_ecr_repository[positive2] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", + "similarity_id": "41d8b392ad235c3edc21ad1949cb2dea672f8b2eb66f34c6aa034806305fa8d1", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo3] has policies attached", + "actual_value": "aws_ecr_repository[foo3] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf", + "similarity_id": "ecd63d0819ee39da31f410c815a244766cf42f32cfe0cb4c2236ec19db2b3259", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[negative1] has policies attached", + "actual_value": "aws_ecr_repository[negative1] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf", + "similarity_id": "92a07dc4b4c5d1ff71a7894317c5ec66fc318281499385282fc6ae148012ee48", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo2] has policies attached", + "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf", + "similarity_id": "a3a3b0ddb0c3347f42fbbdd1a3df6a05be7fc4641821b5b94df24172713e7a39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[positive1] has policies attached", + "actual_value": "aws_ecr_repository[positive1] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf", + "similarity_id": "6e70fd5a74b4785fb59ad8ade508ffcb22add60de80d56738dd010ef90d79f8e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo] has policies attached", + "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", + "similarity_id": "928eb27755a917965f50bc22837bd086a9720e3a3b408cd92028b49246daea36", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[positive1] has policies attached", + "actual_value": "aws_ecr_repository[positive1] doesn't have policies attached" + } + ] + }, + { + "query_name": "ECS Cluster with Container Insights Disabled", + "query_id": "97cb0688-369a-4d26-b1f7-86c4c91231bc", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_cluster#setting", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "ECS Cluster should enable container insights", + "description_id": "b48a7a70", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf", + "similarity_id": "fd7ce63ec0c27eede371cd75faa44d20b7857668219142aa30643548b1ce7a46", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_ecs_cluster[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_ecs_cluster[foo].setting.name' is set to 'containerInsights' and 'aws_ecs_cluster[foo].setting.value' is set to 'enabled'", + "actual_value": "'aws_ecs_cluster[foo].setting.name' is not set to 'containerInsights' and/or 'aws_ecs_cluster[foo].setting.value' is not set to 'enabled'" + } + ] + }, + { + "query_name": "EKS cluster logging is not enabled", + "query_id": "37304d3f-f852-40b8-ae3f-725e87a7cedf", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_cluster#enabled_cluster_log_types", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Amazon EKS control plane logging is not enabled", + "description_id": "80a41f88", + "files": [ + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", + "similarity_id": "ea23cd17cdc6af671a04d24087afdb603c526339b6bbc49b3a050ce1a479953a", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "9af86bc9ad868c65f393ea73969843547349912266ffaf73998cb7bbddf1c300", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", + "similarity_id": "5ef537c677a6afba218fbb49a0d2912a9ca4421dbd290905794a4fca73d147c5", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "aa38638821da64182ba6325b3108229b568f6fc86d8e34bf4cb54f712ecd3e64", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", + "similarity_id": "12e2f7ef77d7217d1efac4505c8f6ffd3dd1bf7f74da0ea29feaabf853a5cec8", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "474ec310269cb47c2e8c502f9780dd00c88229c360f81bf46098b61de4b09566", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", + "similarity_id": "acf0d6fe41f3ee63b4cdd8dfd44c11daeda14f66851c0fa4a923a108f5f4311f", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "506a86eef7b5f37f51868cd6b50172d6676e2ba4e9fa298ddb40b2474ac12b13", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "7952c870e2b60992948cb69971ebf217cd3bbd3ffa20d1aef570779e7b4c6c3e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + } + ] + }, + { + "query_name": "Global Accelerator Flow Logs Disabled", + "query_id": "96e8183b-e985-457b-90cd-61c0503a3369", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/globalaccelerator_accelerator#flow_logs_enabled", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Global Accelerator should have flow logs enabled", + "description_id": "3670731d", + "files": [ + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf", + "similarity_id": "5062e9e4c9a1fd516ce32e402bc055890601539522e8e9970dd89b7d16609e7e", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is true", + "actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is false" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf", + "similarity_id": "d3974b027b3698a009d0c9fad7eb69e174b34f2e530ef08f9025cf0303e21a89", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive2}}].attributes", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf", + "similarity_id": "7b17dea423272ac3111dd9c1defb6a5cb28358653af1b6766c2571474fbf0289", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is undefined or null" + } + ] + }, + { + "query_name": "Hardcoded AWS Access Key", + "query_id": "d7b9d850-3e06-4a75-852f-c46c2e92240b", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance", + "severity": "LOW", + "platform": "Terraform", + "category": "Secret Management", + "description": "Hard-coded AWS access key / secret key exists in EC2 user data", + "description_id": "9e8cbdfb", + "files": [ + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "386eb6c894a751bb4c089aa6904a34450480e1be590711023a2a68ee14da0796", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "module[ec2_instance].user_data", + "search_line": 0, + "search_value": "", + "expected_value": "'user_data' doesn't contain hardcoded access key", + "actual_value": "'user_data' contains hardcoded access key" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "28ca023b3095df8bcdd8113702d7b4e7e6d7565bbcfdf27b4a8b0320b95299c9", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[positive1].user_data", + "search_line": 0, + "search_value": "", + "expected_value": "'user_data' doesn't contain hardcoded access key", + "actual_value": "'user_data' contains hardcoded access key" + } + ] + }, + { + "query_name": "IAM Group Without Users", + "query_id": "fc101ca7-c9dd-4198-a1eb-0fbe92e80044", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_membership#users", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "IAM Group should have at least one user associated", + "description_id": "c5730db9", + "files": [ + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", + "similarity_id": "285761394d82852ad596055c04de19f70aaf315c615e1076931a22a9073a79eb", + "line": 33, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_group[group3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_group[group3] is associated with an aws_iam_group_membership that has at least one user set", + "actual_value": "aws_iam_group[group3] is not associated with an aws_iam_group_membership that has at least one user set" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", + "similarity_id": "805610ace38cf5a2e87c2ef32b969ac655106aa0fbfbad6b1dd257dec660c6ae", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_group[group2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_group[group2] is associated with an aws_iam_group_membership that has at least one user set", + "actual_value": "aws_iam_group[group2] is not associated with an aws_iam_group_membership that has at least one user set" + } + ] + }, + { + "query_name": "IAM Policies Attached To User", + "query_id": "b4378389-a9aa-44ee-91e7-ef183f11079e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment", + "severity": "LOW", + "platform": "Terraform", + "category": "Best Practices", + "description": "IAM policies should be attached only to groups or roles", + "description_id": "32ec58ec", + "files": [ + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf", + "similarity_id": "4619351e06f1202125fc936249bf43cd1ff9f8aa11aa8cf5c2aebbfe70366175", + "line": 16, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf", + "similarity_id": "679e2c76614e5e49869059447940cc5e3165f92a31f48ade26047523c14fda95", + "line": 21, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive1}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", + "similarity_id": "1b1a88ebb0d04ce7b81d092077fc19c5bc8b0adc573cfd58ef281b72f254ad8d", + "line": 16, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "1bf8f2601c8486a9708416092f309ea29a76b7cf51ef881d796ba9c7f1b793bd", + "line": 18, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "6419b72051973e4c00d7d54b48f55c34c1cfca8bf8c75fd495d41b5747f04328", + "line": 18, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive2_3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", + "similarity_id": "6fe36dca7250fca742b2bd26a5cf6d1f181d7718357d641fe1ce1571b0cf3c36", + "line": 14, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive5}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", + "similarity_id": "1448f6502362444803952fac7aa4babd5c2e85d8bb7978861404a2d1f4c3e93e", + "line": 14, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive4}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "d3dc6076fb6b17fbb5ba5f8c0696525805a43326323500b351eb474286337656", + "line": 18, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", + "similarity_id": "52e90dd603b1b654528c98bd55be8a6165eb0db29d1a4160f5741bfbd7ea547e", + "line": 41, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative4}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "b0eec0b0ac66adb9d0af4160872d383af75648d0ef158c475eb861a72bc3d2d4", + "line": 18, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_policy_attachment[{{positive1_3}}].users", + "search_line": 0, + "search_value": "", + "expected_value": "'users' is redundant", + "actual_value": "'users' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", + "similarity_id": "16394178b78c3b4d7fec4930b6a69874934510ee21d280106ef3d21ac31cad5d", + "line": 27, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy_attachment[{{test-attach}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf", + "similarity_id": "cdaf19088a4051d29f0ebc58892b68aa195bd43b1ff5429b60e07eee8fbb3663", + "line": 17, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive2}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", + "similarity_id": "640d8318e35394c2680e0d8a3abda32dc62fc3b523acd771c26346edbe721838", + "line": 14, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf", + "similarity_id": "0027672efbb7f9c72af92fcfdb70fde73a68685dcdf81354b5bb5c30d00004ed", + "line": 21, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative1}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "67dc74aaa73e6f5da59f0d8f445dcfd966fd7c16aa365f4b5af2013497a6baad", + "line": 51, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_policy_attachment[{{test-attach}}].users", + "search_line": 0, + "search_value": "", + "expected_value": "'users' is redundant", + "actual_value": "'users' exists" + } + ] + }, + { + "query_name": "IAM Policy Grants 'AssumeRole' Permission Across All Services", + "query_id": "bcdcbdc6-a350-4855-ae7c-d1e6436f7c97", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "IAM role allows All services or principals to assume it", + "description_id": "948aa2ac", + "files": [ + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "a8586916c33865b58fdc9484bca98bc9f510eb2858b0a32abf2ca2f6f612b89c", + "line": 70, + "issue_type": "IncorrectValue", + "search_key": "aws_iam_role[positive2].assume_role_policy", + "search_line": 0, + "search_value": "", + "expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'", + "actual_value": "'assume_role_policy.Statement.Principal' contains '*'" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "2b9c4a71c4d061182cf960f68ccedd0222857f876febf7fbc615a39d81c230fd", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_iam_role[positive1].assume_role_policy", + "search_line": 0, + "search_value": "", + "expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'", + "actual_value": "'assume_role_policy.Statement.Principal' contains '*'" + } + ] + }, + { + "query_name": "IAM Role Allows All Principals To Assume", + "query_id": "12b7e704-37f0-4d1e-911a-44bf60c48c21", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "IAM role allows all services or principals to assume it", + "description_id": "a54d0d27", + "files": [ + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", + "similarity_id": "c394fc4d53436ed1caef5982a81ff45e0700de56565da09f93f3ab704199195c", + "line": 37, + "issue_type": "IncorrectValue", + "search_key": "aws_iam_role[positive2].assume_role_policy.Principal.AWS", + "search_line": 0, + "search_value": "", + "expected_value": "'assume_role_policy.Statement.Principal.AWS' does not contain ':root'", + "actual_value": "'assume_role_policy.Statement.Principal.AWS' contains ':root'" + } + ] + }, + { + "query_name": "Lambda Functions Without X-Ray Tracing", + "query_id": "8152e0cf-d2f0-47ad-96d5-d003a76eabd1", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function#tracing_config", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "AWS Lambda functions should have TracingConfig enabled. For this, property 'tracing_Config.mode' should have the value 'Active'", + "description_id": "2f90e1e9", + "files": [ + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "90c962f52ea5fed37397420fb45e01ab7d02ee5d6707eb50f951ccbdf1a9e0e9", + "line": 42, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[positive3].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[positive3].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf", + "similarity_id": "221c1316482638700a2f8404f25ec36edf60cf4788960eaffbbd4e2cb6e19619", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[example]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[example].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[example].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", + "similarity_id": "879dd6eaf9117579e428fd7c9764df817b53612e481a9701cac2fef30a866eaa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[negative1].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[negative1].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "f9a59c4f008029eb7cafa5be32b4bcdfce73aa126222b82f5fd1795a638f9570", + "line": 45, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[test_lambda3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[test_lambda3].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[test_lambda3].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf", + "similarity_id": "da77dde7226b2785bb929bd0569096bbf06dfed82552a22db0f0269ed02e4d0a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[positive1].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[positive1].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", + "similarity_id": "e267a4abe1ea25b3bcd73fe6c1032c04a2f98c5396b792ad8df4c83c8a554956", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[negative2].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[negative2].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf", + "similarity_id": "1ae5ef4c9c9b4fbe3a29775913c97c179493c7fa2056cffd7613d6197a888ff4", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[example]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[example].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[example].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "9c97c2999f97ddefa91676d42f4fc80fa0ece58b5d3aad894168e51b3f0676ac", + "line": 28, + "issue_type": "IncorrectValue", + "search_key": "aws_lambda_function[test_lambda2].tracing_config.mode", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'Active'", + "actual_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'PassThrough'" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "c36c67bbf19e43571a3f0c25cd25d8a0d02b75f347310432f0235f9f577dca51", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[my-lambda]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[my-lambda].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[my-lambda].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "4281231e68cfa1f32f1d8548bb255521f0556a0590581b416a20ac4c11449fb4", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[positive2].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[positive2].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", + "similarity_id": "2ccbdaf936a8640323ff8f4571e340c35b10b037a4acecb72967560db09213fe", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[test_lambda]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[test_lambda].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[test_lambda].tracing_config is undefined or null" + } + ] + }, + { + "query_name": "Lambda Permission Misconfigured", + "query_id": "75ec6890-83af-4bf1-9f16-e83726df0bd0", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission", + "severity": "LOW", + "platform": "Terraform", + "category": "Best Practices", + "description": "Lambda permission may be misconfigured if the action field is not filled in by 'lambda:InvokeFunction'", + "description_id": "8fb6f06e", + "files": [ + { + "file_name": "assets/queries/terraform/aws/lambda_permission_misconfigured/test/positive.tf", + "similarity_id": "b8cc9c2cf47dbd3e2763ae84228a73c6e4d8f1b1372d1df2e530bc0ca1a645a0", + "line": 2, + "issue_type": "IncorrectValue", + "search_key": "aws_lambda_permission[positive1].action", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=positive1)", + "actual_value": "aws_lambda_permission[name].action is positive1%!(EXTRA string=lambda:DeleteFunction)" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "7de0da40985af94826cf7e9ac79ceebe2450d6023499fe28ae74f514e2e60955", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "aws_lambda_permission[all].action", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=all)", + "actual_value": "aws_lambda_permission[name].action is all%!(EXTRA string=lambda:*)" + } + ] + }, + { + "query_name": "Missing Cluster Log Types", + "query_id": "66f130d9-b81d-4e8e-9b08-da74b9c891df", + "query_url": "https://www.terraform.io/docs/providers/aws/r/eks_cluster.html", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Amazon EKS control plane logging don't enabled for all log types", + "description_id": "e89d4ffb", + "files": [ + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", + "similarity_id": "29c1c63896bc934cb28fc15f46bd6b5b3e0503472fcc18a0684a51906332225f", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_eks_cluster[positive1].enabled_cluster_log_types", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' has all log types", + "actual_value": "'enabled_cluster_log_types' has missing log types" + } + ] + }, + { + "query_name": "Open Access To Resources Through API", + "query_id": "108aa260-6dab-4a75-ae3f-de917d634840", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_method", + "severity": "LOW", + "platform": "Terraform", + "category": "Insecure Configurations", + "description": "Open access to back-end resources through API", + "description_id": "13e1db34", + "files": [ + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf", + "similarity_id": "b5186c7355c674a759a119eadf0ea62d9e92b31f634d6ecca779fbdaa91e0410", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[positive1].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf", + "similarity_id": "7fc688aee3afc1726301df553ea23582bd273e8d5da9efcc6c0faad15668d10e", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[positive3].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf", + "similarity_id": "a604af7dbec02fc8fe1003ea1b5d40ef5af5f2a992926ff84de55b87cadd3c44", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[positive1].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/negative.tf", + "similarity_id": "e1422fdec41b14fbe25c139e7d3afe1230e677fa2493c7c63885ef292fa8d368", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[negative1].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf", + "similarity_id": "428222b967fd3426fb88fd8b8dffe7bea17c413eb467ace7881de81cc32896c0", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[positive2].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "479900699128eaabffa3c92959cb9f0abca3d57479dd45d55385d3f9fb745274", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[api_gw_method].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + } + ] + }, + { + "query_name": "S3 Bucket Logging Disabled", + "query_id": "f861041c-8c9f-4156-acfc-5e6e524f5884", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "S3 bucket without logging", + "description_id": "fa5c7c72", + "files": [ + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", + "similarity_id": "0915aa52adbb371bb4a7488155e4ef394d35f37ed1c890a4f8f12f1f186c8752", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", + "similarity_id": "cc9bf4dae29fd0f2bc32e10d8d92e1912ee7c4fd592b08539b0336d6d3ed22d6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "08d2f1ba393b422a98ae80ecb6474eb1ac6fee1fa8eb9f19bf4510a9296409bf", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative2.tf", + "similarity_id": "81ac236433d26b714167f13fd591d8a3ad06464d31d765fbd872ef39335c3ee5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf", + "similarity_id": "73d4acf2a493d9205572152fa1ae35fe19df7217bee1c155bdc768f5821142d9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf", + "similarity_id": "72527cd0cae9f92f3bfe3288682e583b00c131e969c03fd54ffc328f1087c5e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf", + "similarity_id": "7d7d60194b30a7ba7c453791434402407a8b6401f1573a70d9fda7ae436f3c41", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", + "similarity_id": "681c66faf22b5e1e1e967afa02622bdafa82545607fe5cf81641b4bc3657549e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", + "similarity_id": "8d0898acec0a1ba12648a3b4d44702f66878f2795166157fd319ca1ca42142aa", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf", + "similarity_id": "c0d8b47c8bd16658a8446cbeb7146fb7ad4320b8d03b79a4c52ad3ab6ed3b7e0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", + "similarity_id": "d94db8aac11974b9d146f092656796518f48ccce376e51f8b9623802921c7a24", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf", + "similarity_id": "1dd387eb9dff7e7dcf6f1d587943420283e10d846cf4c193c79f2b20f4d35593", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", + "similarity_id": "03cee6b520cecf1a644965448af933afc876c602f901b1b3fe5c634ffd3d5b67", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[examplebucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf", + "similarity_id": "6a33cd534b0a399020fec16e495133041119626663561f662edda39679589f7b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", + "similarity_id": "ec018561940182f367feed6138921073f5dac046ba59c870555859e171c83d2a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", + "similarity_id": "8477c4328c2315f099d0ff9e1a0545f9b95393f78c76ad712f7a32e94340093d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", + "similarity_id": "f4c9b343b949dc66ce7458589cc6f5e2462b69bd31ae61a6852fe659270d1114", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "deb195785555f0c7744824380d5fd584f0241f64bd66d3f0ba6b0389ea838714", + "line": 20, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[foo3]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", + "similarity_id": "6aa4bc5549c7e8abc450cf57da0b34bdcae87d5167bda63cb64618b6454e36d2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf", + "similarity_id": "15c731818a0518c1cbd40cfd9a081f21672f9df569b04f43b6ac5f3ce21c184a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", + "similarity_id": "fe333664110b55936296c58e8f0dd89292300a89cf18a5e08927ee4b6f652876", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf", + "similarity_id": "f88320680c17805355e0ba4d193f0799d9500db8965342087ea0663b38ae0b89", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", + "similarity_id": "1ed6def5a4f456db5c42e770f725f9167ca4512256e86d7bfafbdb2e6bbf28fc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[examplebucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf", + "similarity_id": "0f45afc602dc017e4d3d51b3e3d457c3ba3d14df77dadd4f14d41d02b483af89", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", + "similarity_id": "a1787bcb105b7d684f4d275c74708a5f4bcfc9172025de79c7832df2feae319e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", + "similarity_id": "70095ecc46abad3919fe45647a7ef9dbe372e3be0b578ab590add42a1319e82e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf", + "similarity_id": "9d4be52e420a24181dfb42916f1f7ddaeb7bf4fc86c942aa081684ff48fa416c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf", + "similarity_id": "8065e73c191fe04b214bcee64205162309d146debceafb9c6f1f2fd205cc4708", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf", + "similarity_id": "41de94e33d79f2f5ceb94789cb2266dc502f6237b08814d3dc1fa641bcc1a9da", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf", + "similarity_id": "3ab80c87b6a52b8f6ea28304a0aa5e66e7fff00b3f68ab2525ded6bc96be0f1f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", + "similarity_id": "39aaecdf77977a57260bab5f6eb8e175a8835477dc7d6802456ac8153c2295b1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "260607d6f88cba8d3758db9d6c48ed9c9f77675557a600e78751f1a506606795", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", + "similarity_id": "b9c22b6443fb1c72003d54b42ce03b29ab342831be3c8fef591e2069a49bc9b5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[hoge]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf", + "similarity_id": "1ca1a3389568cd4a212e00b24d6815592d41128a893f4a981c71e409b1138fc1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf", + "similarity_id": "3b86147e87ac88cd34567124e616ab4272f1aee209abf5dbfbb559d542a1c389", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", + "similarity_id": "d9df5ecb82ba61b3b1f4d11c2a835f8a6d6ec6f2abf72553094a643f9d1c1d96", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf", + "similarity_id": "b902ca93d0dd65dec9401d421fc8551ce95b9e01fe376fd1c63dc289b49964ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "0315960ed11da1920ddcd1c88590284897e8960428dc3f9029fb54c8682a64fa", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[public-bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "ea12bb651a66eb7ef1ef19e1cf74888cf9939eafda0595c20c38733554cb4d6a", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf", + "similarity_id": "634cb860e1eb17b6b2ea7823138f533ed1de06e73a6f8211630b60dc993dbc2b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf", + "similarity_id": "ab2c99c73f0517c204ef944863cfc24a334d7decae6a278c026c88c452a4ae9c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf", + "similarity_id": "2573b12ac2dbdf6ea55ea97db3082db15a486d7874205d3155562eb5a7ce0605", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf", + "similarity_id": "a3a0615a6c74c17c71e86faab892abae8abe4f564142ad45743549e62ebc95cf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf", + "similarity_id": "3988d7d4b1e7c3f11f8982e6710721bf80fdadc5b3935de4dfa569440fee00c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", + "similarity_id": "9aa262582ff7169dd37bf14666416bfcade926adf997a9cb66c6f4a0b3b215f1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf", + "similarity_id": "dbd6f9d2ef166a294a9716425ae89bd7dddccf9dffeaa1da594f949bb8664364", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "7d7b7fdd970ce0417c7e568ba68c96e67b301cf998d8da975cee54d95e3fc0f5", + "line": 69, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", + "similarity_id": "01ebbbc0814026249abe28d344f7c9685a2cfdc3f7da904b04ac5e81a331e3ee", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", + "similarity_id": "b75cb331e1a12cb3c57313e105d1fa3f18fd95336be85b1461eca2ed3c6ee7fa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", + "similarity_id": "d7807cdc2179397472f3afc58aae2b649abc46bc9dfc91f467d4565b86b4d6e7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "6df8fa568d393e4afaa9ef9f0c68db065e79edd30269354a4aead732b78351e5", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", + "similarity_id": "daabe0b8ab0b25989d23980f116645dd15ffadafd6b2dc87f3425040fb3a765f", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "54bb5a2e86fb1ef979a54344d1cf84af0d3b3d2db5333e2c93b8558c353b56e0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", + "similarity_id": "d4ebc6b252560b21b287c3cf9dca6241be0c4212d96c66d3de450ea9d5cfc32b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", + "similarity_id": "c9797a7a687eb64048e7a67e177250875cafd9d8f20ddbc2ec911cd4997b1e47", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "ac31511dfa5fcd27c24e6785143f4b997d3f83d0f29c58c4ebf6f2d112722f39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", + "similarity_id": "9afe4fd52fb3e57d863b9c43c4a4053017a8f750cb7cf082d48adf1dbbae8f6b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf", + "similarity_id": "023e1312fa46619b8e401bb8088657f70ae7eecefad946566e4b8e3131c9f649", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf", + "similarity_id": "6ae7fe45f53495b56d1bbf45cb61f185bac67a03754f0d69115f9590a86449a0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", + "similarity_id": "39a30aa9b09b75a2ecbc508760f6e68d2f1757a70463a061137ded98c0520842", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", + "similarity_id": "8eb933ca43156e90261b896b7b181596e56a174b61d7c73af3c785f2f91cb298", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "8e16d8e4c29e049641699297906e71b844137a471c31f72d5bf8ccd0ad39f936", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[public-bucket2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", + "similarity_id": "0dc544083130ec1fcaa0db8fc0ff334ee442e1b65fb7258ccb5524d2e344cb19", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf", + "similarity_id": "4e636d1f97e1f2cfa3c0db39a86ab833e2048cb602cfbeed5e69db546ec480a6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf", + "similarity_id": "b6bd290c669cc5a290e14a6f8b13e94c800b12fdc5f6c8b274be7b20cd820d43", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "9dd31e0d0c17a9a1f42e674d7a6266d0f295a080ae9db3d008c7082a7373b7e1", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", + "similarity_id": "6b7e683a6c4ad57226d6cccc8a3a3567cda15bee638dfd9ec532f55416de9a32", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "4fcfb8b719aa40a89a931533f00d6c1ea7e4c9b56eb2f4db31ccc1e25f68cf85", + "line": 19, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", + "similarity_id": "7d1fc5e13ce4debd7e306fd9fd67af6f8f9f1b6d59141b6ac4bc8f2aa77a9c0a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", + "similarity_id": "e3c2491f7b9e0558bb0dfa1766243416afcab98ab4414eeba9294ac7dcbd5a5c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf", + "similarity_id": "37d1f089b978b8f000c435d2c195ec194ff7d1e9e7b9b918a2088dffc0684de3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", + "similarity_id": "ebe16727aad9266db3881f15d4683c3b9459db73ec614e6522c4a339c6fb092b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf", + "similarity_id": "00bafa01ec47e3a3437979f8b1ee6533d0b82b65bade3a2c5d08fea5954acbc3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf", + "similarity_id": "dce28f927cade1cd6db83ea98553e0cd9b206eaffd6dbe2691c32ed5b2f0e189", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf", + "similarity_id": "03c6bca4573b6e5586d17b38878736a0d6bf7dd4f7fe15f1e6636c2eb9b7f8a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf", + "similarity_id": "4c100307872c0e696614334030b726cbcc9e07007b32adb684669ee2c8e6e4d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf", + "similarity_id": "067cbba611660ee39e3093b4de55bb6630a896f84eaed9e1bbd39f08c1a15470", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "f56a895cb2703452e851707aa1ccbff17f64973332310afebeca0fa063435156", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[log_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", + "similarity_id": "56321e63cf9bf7e585aa5b32cf746a9a472182a42179f5b6b44a7168a572eff4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf", + "similarity_id": "1eef054ca8c0cf3fb61e3f544cf8969bac8ec118b1e1afc953ac295797341989", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf", + "similarity_id": "b2be7114050039888ec68b11df402591620cb364530d1469ab8ea385dfe3cd98", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf", + "similarity_id": "d0e495aa3e76a7f477c0a16fdbb23d9529908c14b369d9b4008be62691f0445f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf", + "similarity_id": "e46490a206cfeb7922bdcb6de0cefd97494201d0b0b7a502a610951ca64b08d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf", + "similarity_id": "acdf13f0aba1f64a6ec3cd2c5d0fccea45bf730ba0644c3791ac486144b5d9c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", + "similarity_id": "bb0a883ebd72676d1d7eeff73de387ebbd2ea56e41ec1e9e1dc8fad88fab7d34", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf", + "similarity_id": "96a715108c28aa063a3696d9d7187b18203b780a99306c68943a67e88000dcd7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf", + "similarity_id": "17ab3cebb90e1ac64eea3309d43af7759795bdb7060e7d923bdf714b12d8a1d8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", + "similarity_id": "61150f3e4862e130dc7225977347f17fafbc02f909c47585010fd36073e56f4a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf", + "similarity_id": "4d142c7a002de3bccdbd4da870de9247d5b64df77923b7c77e3fcd22dbf2e164", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", + "similarity_id": "330d36cefe4844ed71344daabb7dcc6706ba82c35eb00fea6455445352609767", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf", + "similarity_id": "51f3df7d783896f1cf3b10f737d51a336a0ff74579aacceaf3556661e1168620", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf", + "similarity_id": "0adb6b9837255be0951c00d3718d8d7846144ff58a9467ff49600f8b01ee4711", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", + "similarity_id": "0bf0e1e971097873aae8479f04d743c4ba60023a97252e07a71d4012c187bec6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf", + "similarity_id": "1449495796406077b9f7f690f44a390a6e6a2d6bca2fb0d53761d4b0d58830c8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf", + "similarity_id": "e094d4e7d171f8a25830bbf4f7b3a95b6e337408d8ce41eb39ac9393d28769ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", + "similarity_id": "966c610ebfd12af0d920d1b8b166631b63efd91220d0d3fb96823f87f01c1b2a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf", + "similarity_id": "b04a5521901963ceeb3e93a2ffad00547327f2a0e1b822b7414263f7e30a31c6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", + "similarity_id": "e272197b04b7353b2be59f77993911d206294ffbc1420751b9bed03c130e53d2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "06c253e54a7686d7d133993da0083c138e9278b226dde197bade410a3f53c0eb", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf", + "similarity_id": "742b12b99176590a7589937d6ef5c5472e1aec9e5ec957a85b3de0bd12b72fc8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", + "similarity_id": "3c4fa30a384038c4cad1c1b9376fa405b809672d9197a5b5ccb25f8e847990a2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf", + "similarity_id": "743b530244ca7c8a84ac4edf504ac3ddbb12ab46ad4c8ac07538a22960b80da8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf", + "similarity_id": "3cf673c5a977f281054d6d4156be0e7596da5f884d4f0e395276c8e7b90d9ab2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", + "similarity_id": "b5e83aa4afb5444142b4f791cdc2bf09d76595e2731815e1b6aef6519fa4b7b5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf", + "similarity_id": "ed137e59345e2b22f2e276ce551e52704fc4bd48cd3659533ebfe9d869054941", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "50c0f28599265a6084545cf5ecdb8a168a759c9bc1d1416a171767eeb0fd8de2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf", + "similarity_id": "fe6705cd4526a5ef249287c724128ba030604f3e06dc2a98fb29e2830ddb97e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", + "similarity_id": "aea43cd2159af3ccc0a42473849b9253a35889663cd42c48ed64ba235e9e457a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf", + "similarity_id": "7ce19aff3cccb4db66e6bf98e01f3907da2ea7cdee5a39fd031a9e91aab33ca6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf", + "similarity_id": "6542f539810975fd03fce457f6c126b121bc275fe28708e6015436cecf39d9d9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf", + "similarity_id": "c217babd1d0774280821f86c9a119648c254964ebd695e122c9d24193ab93348", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf", + "similarity_id": "18f347bba0943b04a2e48e68db2da150081d0ccc8416735f3887f1ae976b48e6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", + "similarity_id": "7092ea9109a6c514ed12b6a4dcd850fb2fc453a495e7f36f7a2b3a1e78af98b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf", + "similarity_id": "e6121dd5493655a20f002518e02c3e55f3eb943250e7245b0e252a9a77a508d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", + "similarity_id": "941c933f29b056495bb058522503c56a5632faab1df651c74ce5cdd153808087", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", + "similarity_id": "42beaffbf742cd3f21e9efa2585aa345621a52a8a25b4b190e2b6f2a4875d8c5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[hoge]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "be9044d72e3bdf08621a66a937a4986f6c27abbc00f0f153241cd00731a2fd49", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf", + "similarity_id": "e41aa28a2426f4eafb157734d27c9df647e58fc424bab89506e77e9be3cbcc93", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", + "similarity_id": "d6894906f876bc3344b4f5a3dff58286f2532322be0234814ed4124f556a2a0d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf", + "similarity_id": "15108fc8dd8d99782c479ec16bac84ccc0297ed32cd61e66891151cb974a9092", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf", + "similarity_id": "ef3e4154565720db79a1b6164fea48d1de681f7078cd5da14e617d4be2b2ba38", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf", + "similarity_id": "26278fba0f567aa336d0ef2bfee84346f1e43b5b037575d888829a85cf62ea88", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + } + ] + }, + { + "query_name": "S3 Bucket Public ACL Overridden By Public Access Block", + "query_id": "bf878b1a-7418-4de3-b13c-3a86cf894920", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block#bucket", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "S3 bucket public access is overridden by S3 bucket Public Access Block when the following attributes are set to true - 'block_public_acls', 'block_public_policy', 'ignore_public_acls', and 'restrict_public_buckets'", + "description_id": "aa9967ef", + "files": [ + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf", + "similarity_id": "70c4308ef7d7d89ef019a60b350e28a0cf7c43e4faf5a891bfa62c5dee98f721", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "module[s3_bucket].acl", + "search_line": 0, + "search_value": "", + "expected_value": "S3 Bucket public ACL is not overridden by public access block", + "actual_value": "S3 Bucket public ACL is overridden by public access block" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "63e90b0b56709120009dab93e51095797b39bce1092455cd41fcf56e10db417e", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket[public-bucket].acl", + "search_line": 0, + "search_value": "", + "expected_value": "S3 Bucket public ACL is not overridden by S3 bucket Public Access Block", + "actual_value": "S3 Bucket public ACL is overridden by S3 bucket Public Access Block" + } + ] + }, + { + "query_name": "S3 Bucket Without Ignore Public ACL", + "query_id": "4fa66806-0dd9-4f8d-9480-3174d39c7c91", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block", + "severity": "LOW", + "platform": "Terraform", + "category": "Insecure Configurations", + "description": "S3 bucket without ignore public ACL", + "description_id": "28aa7150", + "files": [ + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf", + "similarity_id": "46421a142917c62555a69bd425075d2431dc40f63b57eaed61de4282be4e9758", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "9b3730e745dc2f4baedc0855136a9ac80ad27367d6982c79646e1360bd3ef900", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf", + "similarity_id": "ab2e0b6739193c438e2bec7cfb8295e3ddc27e60ddca4e60dbbf9ac10a375837", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", + "similarity_id": "bbb6913a9203d9970df63e616286f66d320ef7b21afd69dbf55c54cb058c4df3", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf", + "similarity_id": "09d8ef7cbf80f91167e216be04a4354c46d652cc67b81ace9bc2869a692242c0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf", + "similarity_id": "3824f67d6190058404e60d9067d8524a7095f909383225db6476cba83d06f12a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf", + "similarity_id": "9174f3924a58fb4a5e0e51cf61a8a7e1accd1ead1097aa46f22b8d1b2bf72684", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf", + "similarity_id": "13c92f771db0b436736f34566562ab99b565d1e3fb37c16828c2355c1664a845", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf", + "similarity_id": "d1be204edb752c652abada7bb3bf5a891cd2f73d46bdf04b7514a466bef544ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf", + "similarity_id": "82166a5963fef238452e22e78ccbecf9f44dcfc8cb365d168c9a386c673df9ee", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf", + "similarity_id": "794e073f1b34dc13bfcff4a33fbc7ddbde933949bde0a8d263c07ad605742c3f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", + "similarity_id": "4062d0be8cd3e56430b79319928ee478dff050ece61e0917128e0786e578a842", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", + "similarity_id": "7106bfbd12b4ac15bbab4f3e09a6bbeb47f9c24c80f8c091c5acd822f35c1e74", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf", + "similarity_id": "c7a17f5acc8732f5d2692e3976d9bbec22c92166499b29fb4f1427b1c9c3fc6c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf", + "similarity_id": "60feebd225a2e753aedf60fa974036449c7c82a1ed00d670e5a6762b2a555358", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf", + "similarity_id": "ad20c8b8f6408498969d99b0901c9163cf047cf5c9fe8519a6dd87aa9401ed57", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf", + "similarity_id": "8310782747aa887c900fed4e72b880cd75596ff225156d2cacc2d237ec50f386", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf", + "similarity_id": "58eb8cc22bc7220f84cb1c98bc138f2f15a8756753b41591f37bda9c9e9b0b6b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf", + "similarity_id": "95e3596c6feb4929ca5c1e770bc352cb378a6b4ef8f8b970f1c9c7baa6da4960", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf", + "similarity_id": "ee4c600881beb53931b0bcc4dc9081b082c25db3c913c9d8f02f17c2d35403b1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf", + "similarity_id": "868ca309ac1af951565c615b30f5cac4ce0590914362962e9296c8456cd00197", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf", + "similarity_id": "55584d5e8a2c97650335e12d11ebf447fd1be8adc3131c376c0332f9f6dd0264", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf", + "similarity_id": "f2c4d02711c31d8064e8541b8d3c0cb497028ed9350d68ce9c5f4571ca9889ea", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf", + "similarity_id": "7e379ce70be7be1e2cbd2535423f228298d35d5bd4af08895ac1407ead5ee67f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf", + "similarity_id": "da28b27e0b7d31f2cb89e87424f70bf3ca3400a98eebe923ab5218f16d4f62ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf", + "similarity_id": "969d115e069f3f3d8145b70c18b6aff6cc3106df6d0b54f1fbeee95fa9a73b26", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative2.tf", + "similarity_id": "5f0d481638563d43ec8e0c780389a129fff129f5e26da6cc5db65822ca32f4e2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf", + "similarity_id": "3219ae66520350c5f684706fcee073780c38002c544c741cd7fc2649f4623546", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "module[s3_bucket].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "7915d61527e35dc8c02b27663bf0c4fabbbf951e906c955538a1b0c5145f21c3", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf", + "similarity_id": "5ff8e3d899ad48e8d9b12f045e457008c6a09c77d588d771483bf9a72a1fb3ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "a6a39dffa872be079622c039e04e4399055074f295f5115d6131860aabcf210d", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf", + "similarity_id": "67a9b1e5e52cd2bdd4ad70c8e4add2038d9b687e32b874fb2b71fe5e919ca4c8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", + "similarity_id": "b0be2bb527fa9103cf66ef9e13af23feb65108f02ca4c3e382f54e36278fe67e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf", + "similarity_id": "dca212d4ca54b5f4e97e4596c5f1757644c374a302427e599af8d8a4d4b0f62a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf", + "similarity_id": "24bed4e79074a0732a976b6867b5a40c6546724e2c8ab94d030e14f905610389", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf", + "similarity_id": "93c1e82d98d27ee2b2a3f31855d00d9a2e6a6e581306e8ef0780d8d4649bcbce", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf", + "similarity_id": "a986fdaeb3dcfa6846a75b3c23c7e67f33af01504ea398ffbd9a7ff0937f0228", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf", + "similarity_id": "af2a1e63a149db3a47500c6fc17e68bf8177fc49650e64ae55b9f01c7abf88da", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", + "similarity_id": "44e9de13fc33ead4f07ec60f220945bf3bcd413fd02bfd6888cec57abe58f37a", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf", + "similarity_id": "2d0e65ee6668f306d2b249ac87480b41e7053e68ef8c8030bb4ef629819ba5bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf", + "similarity_id": "f471149c7d3ba246caf92f1d9195ebbedf8c6cba384331a458bc76b95c0fa3aa", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module[s3_bucket].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf", + "similarity_id": "cb92fd01a9cd35a3b9871353a86e970ce81c493ca870e685ec73ecd2faa21833", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "e1aac6701373e656b46089f104a5419d540040231f98ab0d750b6c9f072c9325", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf", + "similarity_id": "4a3841fa0661203dfcb2d1cd254a9aea76f714695c44906f6907452f4f45c471", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf", + "similarity_id": "d458ca77a0c782aa5495c09c6dcffbe5a51522dc6e8ec1d9425077025d4fbc7d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf", + "similarity_id": "4491a578e416b4b72ce8d82ce8baa604d2633066aa2bcbe4067f72cb8115ca46", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf", + "similarity_id": "e5186d764509a91f4ccfb9b0913f0fc03345eae7bb18e8b9a45ebe36011c0da1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf", + "similarity_id": "954025b9ea01b3d8ad931ff920a1f73f15ad3991aa150eb8f226709e4d96e0ef", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf", + "similarity_id": "04d55ee345e43ceab854131a8805981009efa627ccb4192b0e0160a68b4c3d95", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "deeff4aa803636a318fda9ade59e079b385cd016936fbb3a84a7238c7df82fdc", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf", + "similarity_id": "d86c04f2694d542fcced31feeb3dd8b71adf2af7af7bf9fd1187c7d4114f7909", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf", + "similarity_id": "fd19f0ed6d25e208608a32ec7b9f1d6cbe755a79dd68a69402b3139436833e6b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "0d4d10d2c9b1631c2ca6ae5b7ab45b7bd93d55d640cc9d2fe881831e3f4ac704", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf", + "similarity_id": "00ca0ad0f80858a9ce1ab151d3017bbb96bde0b23398af857cab5ea4619314c1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf", + "similarity_id": "a143e24e718793a6d30b701ee30d0565e121b76ec6b809ce2b583b274747984b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf", + "similarity_id": "02257d32562ca2c3cd49816be4ea43e120b3e8c0e7cf49ed49830e622581efff", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf", + "similarity_id": "872ea1aecbf4506f275290b372bf0766832dfb09cfac56fa92ab7a62ad58253a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf", + "similarity_id": "606055c45c823870617251e820a02bff2fb6ba107fec0fc102a01d18cd8b782d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf", + "similarity_id": "d1cd614971c2b066cd8459ee0fcaf457ec703e1102301743a0e67045e9a35e84", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "b033cb9f3871079f45dad2fa67a95c1b430a81c31954e934685a5c62ef616c82", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[block_public_bucket_32].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf", + "similarity_id": "2f92339539f4383b59efb26b0987b4d8a98d67e6876bacd5ea73f95a0a625bc8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf", + "similarity_id": "9b9f3ac357876ef050cd9fb45dd51de920f907417871ac7ddd0f811acfe7fdea", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative2.tf", + "similarity_id": "9603310a73bc8985fc6ed42b81aea4af36b5e5754731d2b8ea7d62d660df2104", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf", + "similarity_id": "8453bb65582e3eff5468433f889fae03e0e6f864321f5c31dc2a134975cb7aa8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf", + "similarity_id": "23022d71ac08b9b9136a5fc1934be199ca47267ea5cf57f7765568d83bd0c239", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf", + "similarity_id": "fbda4c542c849c120c0509bf0b1a2ded8b21314642c6ffc12e706a208c1ad7c9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf", + "similarity_id": "8538a926a7315f20bd3564b8f86bbb46c1dd3373ded43aeb6ab7c6dd62b06b74", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", + "similarity_id": "c53add7236bc0318b9e19672762b2b207608ff85a6c0b190a5759770ba4cb617", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "aba30c7598affff9a1359c4f720505eab9a84724f9ca16126b72c5db08df3e9f", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf", + "similarity_id": "552013651b2f48918d034ead4caebb9360d5563a002861d8bc1390c19753c692", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf", + "similarity_id": "9cb27d9f6150cceb8b56eaeefaa9688cd2dfeb4adc9f6572b691b5ee726128c4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf", + "similarity_id": "7681d963b30a63959ab466ddae0ad90fc4b1340b5d1ae8f24a801fff9321eea8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf", + "similarity_id": "9a0b8e18b53794db1e2ce776a22ed89904f84b1daa080e83c9fb93059e6329b8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf", + "similarity_id": "75e30c83f46a2ac3a6830125984deb7ce8608dee361a6ebc8d078ba95d5c5608", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + } + ] + }, + { + "query_name": "DynamoDB Table Point In Time Recovery Disabled", + "query_id": "741f1291-47ac-4a85-a07b-3d32a9d6bd3e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/dynamodb_table#point_in_time_recovery", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "It's considered a best practice to have point in time recovery enabled for DynamoDB Table", + "description_id": "205ac3d1", + "files": [ + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", + "similarity_id": "f03c038717719d4e52fd0afe624a281d49dfa0075398a0587e3cb73c1006b47c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", + "similarity_id": "74c6bd6c5318eaef60b3105fe86a3d0d2d9aacc51dec5e05b090058ba4634947", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}].point_in_time_recovery.enabled", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to true", + "actual_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf", + "similarity_id": "4d97910308cd6eea33fff5ebacfb96f384f273fdfaff8b3e520515e8e9883dec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", + "similarity_id": "e3ab84533625c6e58bcb96022c917347f39b52c0f0fe9fa1fe99e2fdf060f6e1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "845e0a2e82bc081983abd1ba64f65189f082447269a33753e9124a4359bba0c2", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "9d2737d2fb94bd186b96d28ebbe31e1eaadada3416977f7a4619401f44d4aeeb", + "line": 90, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", + "similarity_id": "2a606270f6c7bb7bf9298977e2f8c7f0f98d60cf7d258bff85b7512b5d49681e", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + } + ] + }, + { + "query_name": "EC2 Instance Monitoring Disabled", + "query_id": "23b70e32-032e-4fa6-ba5c-82f56b9980e6", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#monitoring", + "severity": "INFO", + "platform": "Terraform", + "category": "Observability", + "description": "EC2 Instance should have detailed monitoring enabled. With detailed monitoring enabled data is available in 1-minute periods", + "description_id": "0d5413e6", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "fb5e9e5c2d43d59b4d37d1c7f3f3f4a803d3bda9788dfdf522779036b06b30fb", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "01cb77186b543a354c34c5be8478f882788a57bb95516cebf48843815ac63920", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive6}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive6)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive6)" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "4e462c3427439c8cb969d1c0a4d05d37a8f77b22786044f14a3422dc5495c2eb", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{test-ec2-instance}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test-ec2-instance)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test-ec2-instance)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "616bc60d4322649c538dedd947befa0c9a64a29c15dc042d668c7ca738a258fd", + "line": 109, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst32}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst32)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst32)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "9645f50b3de117e8a021b8709a8b8bb5f7a9cd2d8c41fc606e852fd79c0e5a4c", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive4}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive4)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive4)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "85fcaacd9ef9041b5c6fb1f673033173a758ca10d4b9193897cf41cf75d4155b", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive5}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive5)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive5)" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "a2c506b7b224cce01b5d2281aaaffaedc631bd21a722c4727f46de453670002f", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{priv_ins2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "e4cbafb8a7d4d5062d2665acff7c953c35b9820b9e9bc08684f70b3751aae297", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive7}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive7)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive7)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "e9b1164c5be2c1bf401b14051485e55e49b181416e8ac0d493eb3e19ce56d420", + "line": 57, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{negative1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "8e00104660bd173409b4276a534d79ef5defa26b8b193ba68d97a7c078ddf365", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive9}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive9)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive9)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "ff5d6b09922dfb8272d0ba8070a81a64a4775b6b1b8ff8515d58a29f0556508a", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive8}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive8)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive8)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "371b01927a7c7096c6fec4d1e4ca5580773680aec38310a45655f107088c22da", + "line": 96, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst22}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst22)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst22)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "bfb398b836f9c8600b4aba985efb752c9a8cfaa3f3a74f0e7f7cf6652ea6d433", + "line": 82, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "363534b3aca3623853f868a73d58fab0a88d49cfcaad45ae34a4988799fa918a", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", + "similarity_id": "2cb5de106e6e7d8de2d0bbcf3b610c6ffb449ab807bfccf776089e4aa70f67cf", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{monitoring_positive1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=monitoring_positive1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=monitoring_positive1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "69aa775d5948502a6e89d2e7c9ecb1e08c0fd427cbebfb9bc34f2a83075ad179", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", + "similarity_id": "6efb19f6ecf1966b5372ba125a5dd2536888e227c78503e5a06392132e0e4b63", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "62c7ec970e2906db2b7e4848c712f7b2153b68aa6835490eaa43e2e8084efb24", + "line": 88, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{test2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", + "similarity_id": "65d2089f6e5028e4590a61cb2829b75bd4f007475504600dcf33f48fab2e6f24", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "75893af01a4db33ecd80f9136e8e5664b24f93abe3500d0575bf1935bb104283", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst3}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst3)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst3)" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "be5ffc7f628fbea762728309f0046f2603fe71649c76ca81adb0e0891fd0cfdd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{negative1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "de72601496ae4e0a186d3d900b993fe11bea39d55051c5de3106ca74d100edac", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{pub_ins}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", + "similarity_id": "f4efba1f428b8ff2789680233bc04f2b9238332c3ecff635db7b45039e9f29f0", + "line": 20, + "issue_type": "IncorrectValue", + "search_key": "aws_instance.{{monitoring_positive2}}.monitoring", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is set to true%!(EXTRA string=monitoring_positive2)", + "actual_value": "'monitoring' is set to false%!(EXTRA string=monitoring_positive2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "a4641650983d227d10d35a52e68db1e4d38aeda4f55420c3922c2474c6d81c88", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web3}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web3)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web3)" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "8689c4dfb4cd75e31855e08033351624d05028a3409207b746b852ff99c9a1d8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", + "similarity_id": "278d8af92a08362a9091a6dd4006e2b4c5776c879f2e0d79c7e0ee108a653a90", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "afc6976b05a7555c8f78892fa6264cd47b011e4790050a785180923e887180dd", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "e604a1bb76c27d5c6b344de7d63eb8efca137069f5b01cf0ee9b751ad6a6cf07", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive3}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive3)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive3)" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", + "similarity_id": "0c99cc2bfb0a7247589473e66b04eb2b339484b698f3b4fc52ea3bf6c6653c25", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", + "similarity_id": "06ef5f50950fa554ab73735387a4725286824175219e4ff2c9246fcb9d0565ce", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "module[ec2_instance].monitoring", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is set to true%!(EXTRA string=ec2_instance)", + "actual_value": "'monitoring' is set to false%!(EXTRA string=ec2_instance)" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", + "similarity_id": "c6109be8837868af7f05ddeabae7803c95e36ee62c26f58c305358924b3717a0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{negative1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "4e17df5fd2e1d30e13a180e8e6b81406c0a77337e80e6114e14ef941d9e4ae72", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{pub_ins2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins2)" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "6073e20678715b407134307b01ffee4b23e76a7face8e0b438ec12f5863bc0cc", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{priv_ins}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "52badb86aae36a8c0263149507e1c0d32e8aa6d9f02992368feadabaa4b38c60", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst12}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst12)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst12)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", + "similarity_id": "2514498a7e100d6f2aabacaa8cc4e1f0a7f2d59474e9cef8fb7d6affa5db3ccb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=ec2_instance)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=ec2_instance)" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "ede19bc1eb6ce8d021480f5880a66abb6bebceecf8503d927fd447d80b088c9c", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{test}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", + "similarity_id": "72f91854c0268009c83b8c6af178e60a53876d296d3934e218cbfd20d2cd9020", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" + } + ] + }, + { + "query_name": "EC2 Not EBS Optimized", + "query_id": "60224630-175a-472a-9e23-133827040766", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#ebs_optimized", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "It's considered a best practice for an EC2 instance to use an EBS optimized instance. This provides the best performance for your EBS volumes by minimizing contention between Amazon EBS I/O and other traffic from your instance", + "description_id": "ddce4bd9", + "files": [ + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "c4a06491dcea6102f5b74457b7bfb9b08a4d990808e9d3f8f85e35f51d959034", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_private_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "011dc8503dd732837ed7d4ee7617776ebbd3ed9cd7a4961a9b6837dcc91ed32d", + "line": 88, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "fbfb5c9607a895486d7c821ea64facc86d336e6f945f2bb0eb4082125b2cfe0f", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "bc2f8f6fd18b3a94d87dca6b5435da921868a70fcd114cf5714b9fc040f60ca0", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", + "similarity_id": "e52fc171c7e5ecb99bfa9c987476c634721c0c718ce5baa8fb0efc14a24c9ca1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", + "similarity_id": "66354a1ecf30be3623f54604f8262119588fc6c2d0e91cd305b25f5e12b9e0fe", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", + "similarity_id": "f8e171f90476547c9b64dfd758378f6ea6616d3dd39e015894d953388fab5ac8", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module[ec2_instance].ebs_optimized", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "16d171e432e242727969a74f50061fe611a3b00051e34a59685f73375ebc3f7f", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{pub_ins}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", + "similarity_id": "ff87c287f6db10b6bd2f71b217955419f52b8a20e0417219261a4437c409179a", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", + "similarity_id": "f7ccbb59bf0f8058b705b7c57d75ec788c42e9b9b30f63ecacfaa040490f67cc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "e9f59f9b1a23cbeb6c3a9b7238ff643c0ac4a328a92c2a842b6ea86a804f6ae2", + "line": 82, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "c220efbf0e25f49130e1d9fce452ae28a1ad5ce3c057b49b1547cd744ef8e566", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", + "similarity_id": "a3ee63f10b14882d13199e67e085c72e201a3741499093466d299350e34b83c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "23aea01abc940cecc8ce168c79eed044822f080a60dcd3aac076a7803a9e4cf3", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "af14fc5e97bd84336c325b1bbd3a5509d822f055e6a3566823f95b0af959fbae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "f82a92f2fb8c79b56afe9e01c57ce2a7bea1d2572a8687d81f4040c53263d346", + "line": 109, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst32}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "3e5e65f8454f0431e7a877de325048184b8d6862c580f04bdf18163d797c2c18", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{priv_ins}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", + "similarity_id": "b3eaddee1331cd85e414f05354bf6e94a8df2b615af11495a180cae282158d1e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", + "similarity_id": "8344b4229d994394d98de0a6cc664f50ba2b524395f29216245e88f1cc2f2abe", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "789764d470c6b4357f6a5f2ec52a2019060e8c08112c198e47ba46ca6f3c8c20", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive7}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "8a6b04dfd2de8f1cc74c02fd4c8503c8b901118f4703b78a11a6270aa29c86c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", + "similarity_id": "98d959307541f8d003537375269d0e23a97520f7c2f3613dfb999aed3d26ddfa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "ffa0acbfe39ec7c5c7d37d2c21442e7ac8721cafcdd13687a919926978f8df9d", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "7445785a11415e487ac2e63d28ad27f04713d50bf9db8fb4fc0dc7d20978fd38", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst12}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "8acfb066efe90d2d3280c25ac5b00f8471f492930b54426362e5d290add9f32f", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive9}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "68aa819938a47ae9d655e54c504dbce54600ed5abfa51912d143fbe41348f238", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_public_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "4036bb57a8562699f2bc3e95855700f58ea64527e4d082e53e0ccef0b8f6092b", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_public_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "35a685e9c6c76e75f7617205e6f27563a882e47484c97f65d3e1731097802f84", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{pub_ins2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", + "similarity_id": "b4c6c88e31b4ce9ab062a79bebac8f35502ee7578c9ed8db5bf52e99b946a242", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "beb9d2f657e725c12fb24c822d85dd0e215a83050e104683ac4709a2318531ef", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "c161e1efdd486d50ba5b75cf87d60d91e112c5f17c7c7f956567b70cfe4119bb", + "line": 57, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", + "similarity_id": "985f79588fec3d23db5a958f5002f29d86bfc1d8983b5749504578e9197516ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "67e5ddad789bd369b3dc34e97a0372e9665d4392f17bd9ea7f9cd5dd0e35ca26", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", + "similarity_id": "a81e2e8fe09364e404326b15c57a8f9b5a11bd3ca5dd416fa39525ee1bc219b6", + "line": 20, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[{{web}}].ebs_optimized", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", + "similarity_id": "d35cf5365ac696e1262568fb49a93ccae647e2b34abfc9f578b624abe9cfa7e7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", + "similarity_id": "b087cb883ee2e13b010a776ee3f3f5a06ad211d7f468ad010bd7882957fd8d3f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", + "similarity_id": "90b3da8eeaec7e202feea0b5f07ae04b35ee077f247d838fdd09e0ca7959092d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", + "similarity_id": "b6325c56b8eef5cfb7790051ff9325e986238222df9016138531c485941a811a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "2b38d84be01cb50de9f772e44c02fac3946ff43a0e6ce3c4254f443af8c8e256", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", + "similarity_id": "bbed9a3bac228c8202504c9ffd9c33d80fec44bd5cbd3d63e643bc32263fd357", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "ed81e1904a44154caffa2c6e722db22f6b49de57b6f8405d58c814b55c8ad89f", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test-ec2-instance}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "71ec4e8d73b9aae2218f697811c5f8a3769fb7d8e5b754932208924fd68cb10f", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "65de401a1a6d072ca37f926153076b6abbf568088794547b7bb5478f08c642a0", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "6503dc96aee5641ef965f5c227ba579ba20c8b359ab9bfd7c9d17e34eae4981f", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "f158f107b10e43fafafc2ee787fe00da46ab7a00ed3d1df3ee61d7c1e1f35ee5", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_private_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", + "similarity_id": "f5eaefa76d668c0d8d023406adcba65eab713450bfe0f79c38d02c5591d54991", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "125405ecf869511331479d90e20fab98229b5af88f2f6467b6a22b5e2d62d3c6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "489f8de872ec8586a445b73413d1acc5b2887f01ca8705bb09fe24719fe1441e", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{priv_ins2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "7d04cba353979c81931ec8dc8453c7f89eda7f3a73bf340e271770d28ec25969", + "line": 96, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "54186cb138fd3b96778399f98a0d4ed49c5f66101ff1df1364da43b8e3e0e746", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive8}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", + "similarity_id": "b06d4225f22edd2f8f5d0a2b5a1aa1c150f9dbecd30180726ad59d7d4ab3d43a", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", + "similarity_id": "508e9eddb720ba7c083332676eaccc4971acbff151b929496d013e0abfcc277a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", + "similarity_id": "451cd05bbda645079f06ec60029c8010c63ba9364e0a4ebcb3b102c7be2686b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", + "similarity_id": "a55c7aeb90b6ef5522bf23ed2037a5faacfceaad20f9155d8b5f9a1df27042bf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", + "similarity_id": "49fbefb0e0256a4d5d318dc6ea11da3b8d9767643546ee9f250e0d36f9e814a8", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + } + ] + }, + { + "query_name": "ELB Access Logging Disabled", + "query_id": "20018359-6fd7-4d05-ab26-d4dffccbdf79", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elb#enabled", + "severity": "INFO", + "platform": "Terraform", + "category": "Observability", + "description": "ELB should have logging enabled to help on error investigation", + "description_id": "c745bca6", + "files": [ + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", + "similarity_id": "c01f299eb65b7e9b982121c67b2dbd5ad10537efb17267f6997749d971edd96c", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", + "similarity_id": "72f3042909fd9f50409024615bec4e3b911cddbc7029f5e7ed812cb79d05af51", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[elb_http]", + "search_line": 0, + "search_value": "", + "expected_value": "'access_logs' is defined and not null", + "actual_value": "'access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", + "similarity_id": "9f708aee741b03d2e3f52ad84e249c96d5fddbf697ca39d688fa594967812500", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", + "similarity_id": "812afc05a6aaddb845238634c5159e5a1f74c5d4508f53cfa4bb3f75ad36955e", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", + "similarity_id": "19ab34360976fe242bf917a105df0fd039d5098eec1f3a4a8e871a291ef2f33b", + "line": 39, + "issue_type": "IncorrectValue", + "search_key": "module[elb_http].access_logs.enabled", + "search_line": 0, + "search_value": "", + "expected_value": "'access_logs.enabled' is true", + "actual_value": "'access_logs.enabled' is false" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", + "similarity_id": "65510862ff2d16a1abb66d23df746369608870a38a654f51656ecd0a540d3e0b", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_elb[{{postive1}}].access_logs.enabled", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{postive1}}].access_logs.enabled' is true", + "actual_value": "'aws_elb[{{postive1}}].access_logs.enabled' is false" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", + "similarity_id": "5ad36bb73257067a7ec5b52d24a46923f9fe3adbd1b36830ba95bf1c1c5a233a", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", + "similarity_id": "8a57be56d39922588a43948806ad136fa13900329610adb4f3d048843a0275c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{postive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{postive2}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{postive2}}].access_logs' is undefined or null" + } + ] + }, + { + "query_name": "Name Is Not Snake Case", + "query_id": "1e434b25-8763-4b00-a5ca-ca03b7abbb66", + "query_url": "https://www.terraform.io/docs/extend/best-practices/naming.html#naming", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "All names should follow snake case pattern.", + "description_id": "ac707cad", + "files": [ + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "e285c46817744c1280bfb64d65fe9149837d658cf26c162e38eed311c7d83153", + "line": 58, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow-public-outbound-sg2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'allow-public-outbound-sg2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "bb089a95dd02b703cb65d6805c7079b1d1d19621385c8ae2fe173c1b9a0d22ec", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "25b808efb5305a4719c04521b0c05972677d37526c195361ea82d434d3fc8ece", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", + "similarity_id": "249367a7a16809302a505348cacca833bb8059d56f79fc38b9d3159deda6feb2", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "fb7f720e3e0c14747c960d76d42d7bc7932df44e3dd9a2694eb1c059bbe80b1a", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.subnet22.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "fdc03ac8871e30598503b374f8f2f5f83f1a1f2b13bb70b5c30d70c58bb82bd4", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", + "similarity_id": "7b3b68a918dd88d73ff549d411352e52b6d3aac64779e266d55ecfb9fb50005e", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "23ea1887853b7f6e594a25ebe1036bd8f183ab430fd7db729616ae6ed1683f82", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "1970a581a36226cb3e93ebb04ce33da66a9742209a17595912324918bc3ad332", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive2_1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "17f3644fa599067d8f76fecaa0717289aaab97ed1e6a45827911e007079d2ed9", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "82272bc3b87f1a706567aa6b639d890bef56e27e120db57f8941901d044e8bac", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_public_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", + "similarity_id": "f1b4d960f8ef04edf1b475c21de284bdfebf05c5d6555f481f2a698975426224", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "1a617967c789366f442dc5955cfb0ff806fb07b31fdec254094ef9d812c1a9cb", + "line": 29, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_codebuild_project.project-cloudrail-test", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'project-cloudrail-test' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", + "similarity_id": "288f49cb7fdadf5884cdd0ed9d74ab1e309e072729ac652684e20fdd144b7f0c", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", + "similarity_id": "f21800af4a95b25a989a85b4f4c68211509c0459fc43f64565422de2d7d88af5", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "e7afb4d47d8e8fa79af27c06e63c87971572c0e595b47c41960c2902f19e1454", + "line": 29, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_codebuild_project.project-cloudrail-test2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'project-cloudrail-test2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "0ebb40d910829f1b4ef3d61d275c7d7db992c2f1973644867455d7ba49a163ce", + "line": 83, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "5f74924975a4e69a7dae209cb8c429771cab9899afa60a24254ca1f25f50f21c", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", + "similarity_id": "d8fff975a526e3c952d7c6b2ecd755705c2addc22335dbaa28c14976e6fcc6a1", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_kinesis_stream.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", + "similarity_id": "d1e479d20e2cd542009cc3c6aada03eefae26300dc160c89347a0aebdac769e4", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", + "similarity_id": "978614fb65b98517014164e54540fcbe864913d6f4cc1f9d5aa68f582b306e2d", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "9cac07f936c7f13e03ccf37276b76bc4742173102f001e87d7cf516a41cbe221", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf", + "similarity_id": "5f3eaf2862b13851be3341103d5d8cd265ac3968aabfa0ea2ad1840a774e57a1", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.userExample.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f5ce1190f8358062caaac0020e1aa210ec67c07ab9084e13a40cb47a590d3d6b", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", + "similarity_id": "15ff27f01b200ecedd0a83e4e1efd6d93cf033c5c61f143b5fd8de26b4c4083b", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_snapshot.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf", + "similarity_id": "8bafdf47d66f2c7a9423bbe8242a57dd35843e3e9932bf4b34c91ae6f9d7a570", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "0c771373aa6633cf96a57199d738f9f407b141f753503dca438e839cdd678e1f", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public-subnet", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-subnet' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "8a0343d2f0b970dbd4144cbe4eca4a3388db8db7b369083e22b46584ac99ed13", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_public_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/negative1.tf", + "similarity_id": "9a40e1c74b2fe8c575b889930c74e3345026bdf2f5ff04ded847ecf4ab3e9373", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.negative1.tags.Domain", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Domain' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "56eaf383e2b555fb35ab347b75a23dd4eab76f2b659d1511d67eb6b59d770113", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive6.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", + "similarity_id": "0f5f90d5bbcad7a2d297741bd8de2ffd89a47f75f93ab65d554ae79300cf9b9e", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", + "similarity_id": "483c2ee5e7c33df609593b73aa41ddf87a5b88233dcd4bd1505a1bd946fc4b70", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", + "similarity_id": "cf4cb2606670e5f17c971f13a61dddf77da416578b9569852c7db5bdee1950f3", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", + "similarity_id": "d2f1064ecb15fa4f93c25a072d0ada3c9753f2fc8ae2913bd4f877a4932e802f", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/negative.tf", + "similarity_id": "964fad8476d3a107a59f3992c753034699785ec5c1d116eea05329ac178814a7", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_api_gateway_method.negative1.request_parameters.method.request.path.proxy", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'method.request.path.proxy' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "7cd01288566af4bf2b73a6f7beebe13dd6db4d4c5b1fb83ba7c987c66e47471c", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private-rtb", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-rtb' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", + "similarity_id": "f20dcbf0b8553c5b80a8f07498b2366f84fc8cf227e5a58036af46a58741321f", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "21afbfad8aa9bd96ccab656a78fedb404b872402df16b2077d1ca92fc3faa808", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "dc5125fb387c566468c7b2de011e9319bdeeb7ea0c8b64f885f80c2c6daaded9", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", + "similarity_id": "86929a4af02c4693e76fb46f89142a06d29584ca7150d3016fdb71a578df7f50", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", + "similarity_id": "23dc445910499a3ae192cc9eae493d42c161fc88cd589e023b16da6092461b0b", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf", + "similarity_id": "4764f67ca493c73cee064ad03fe492090f4521dd42b93c618a53e1509222acd3", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "f0bc49a64609c51dab8b4e2e947cb2e6cb5841677a65b2bc38cd6f6ef98cad68", + "line": 62, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_private_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "6b9aaf6736b1ced69f0742d42b60bae52efd4eb2445342855d9982a9b0013db4", + "line": 109, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "10c4c0f6483b14a555518066c38d3b0bc22c0eb86d97a78caf238f27cfdac012", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "59afaadfea06d7788c1ff8df5bc1528b6468c3346002a4f184f4973c13b8e1c8", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "af062b913319f77ce1e0b7d7d5b8a52f75b4a1e0cd6db0125ccb16ae5b0d3ab7", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "062ce6b24d4c2a30afed15c170708b1e18fb288da53fa75ee1781feca8c51a4a", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", + "similarity_id": "803c1d13da5e73e923414a54d4e9212322c9dde9064be6e78ff64d405f22a916", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", + "similarity_id": "5db62a45bb3a74774fededc0852114b05114a2c6cd92460f0f8504afe7a9c20e", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf", + "similarity_id": "3fe57aa9ca515ee74fa96a39512853ff4bd06de289e03d4dda430ab89ba22cdf", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf", + "similarity_id": "1c45be234ffb38de00f40157d89e4e6bf5ab3652430faeb0fbe7cabf41d98bd0", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "0ac4ee7ce2e003690d7ef27eb55aebfbb2ec45fa55cd552e935e69542ae89be3", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "d3dfa853b33aa00fa95ccd1e7c1847a763f28470638727e02b5ae8606853e7c7", + "line": 27, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public-rtb", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-rtb' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", + "similarity_id": "9c2962f6d20b3b5623611395337d08e841cac569cedc80200fc7a0ded350ea82", + "line": 30, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf", + "similarity_id": "ab3c4c6df7b2fb13dce1fd66660eda1837da6f9b49e48d7dcda94c0b06b34f1c", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "0342ffba90a7404e647fa73d5847228d5684b32b9a8288ed9c77e3cfe9b62c13", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_private_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive3.tf", + "similarity_id": "9e1758fac03504ee175af4231201b9bd84577b5005c0750d6f53394db7c8c4a8", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example_3.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf", + "similarity_id": "fac5a2ae883f9a5c7ee3dc3a9fa5fc69cf9ae4abb71ef3237bddec87302a8e16", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "3fe0876526bf85bf5e2f00a0d9d522d8eb01745e486404f98a7fdbbb3f49a3c5", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "2e13b0e7032957cc6e1397681b8d03076a3b00b81168bf98909a3596ad795810", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf", + "similarity_id": "6271733d11dd17a39ef84a9095012d31f0b218e357306dcdc056bdd00655363e", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", + "similarity_id": "09d88e5fea5fa6afecbaf7b295db58fda792c1d7417f1c5d06bc55417f086026", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf", + "similarity_id": "b6b2eb0e2dd361bbdbf853c36bffe16141ece247f8fbe9be9fa1643fc546beca", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", + "similarity_id": "f96178d77d96eb582284c126a1fde37e0c8223d6d63e3a580c9f0e81fba7eab2", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf", + "similarity_id": "bab6ba5d2e5821f229958633010fc8afea81ebd28e6507b101ca6b2fe0c68711", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "e03c7b9834666a08e592f7804026b01a9a09438a4e4433678bb7b64e982865e8", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private-rtb2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-rtb2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", + "similarity_id": "bfc35e787442999874e915c313166a6205b26f4c5ea1f3e0cc9e4b9cb8b392be", + "line": 26, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user_policy_attachment.test-attach", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'test-attach' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf", + "similarity_id": "0aad00304ed7f1ab3e6814d9ac57b271e065c77dfa52d0338ab616b8c8b4dd40", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf", + "similarity_id": "f81753071fa2fa5a6e0eb4107b9b2a9d65cec53d2a0fdc23a1e8a029c2d0de77", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_role.positive2.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "44ad5328cbb17b4693f641c4fae447d3dcdcbc36ece7436d7238626704359f8a", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.public-bucket", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-bucket' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", + "similarity_id": "7464e24b389e0b20dff3e2e55c2c890c4189871e3eedf6c945570bfab96f4b59", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "d0e19663ca3507af85dc5854d92d44886b56a7ef9567774ac473d346c1986b51", + "line": 139, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf", + "similarity_id": "f9d404ccd44d8186d4ff1e40fdb7bfbb963d282b313befe49855724c12701eb9", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "460de1e86a1e473da52f468c49d9852e1eab2f87ac75c4d432cb8a8a1d562604", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1_1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "ff874131a1a85afc40f3d67dd2fb8c0013ccc9a260fec89b934accae44a8ffb8", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf", + "similarity_id": "2739d53a9b5d288508d4108d8f436a71d02de5f8410fcd886717dee408915ad2", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_role.positive1.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf", + "similarity_id": "ececfd2c61ac7da7d39e533fc11b0d6bd58fca58fcfe52c1e728a49d575f08d0", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf", + "similarity_id": "5ae2f209d0ae608b893133bb7cc1bf544372ef6d3a06563a7193764858663f4a", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", + "similarity_id": "e05ba10606cfa215c5341021f319d454c7b5c602be6da75484e606a15d81a4d1", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lambda_function.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf", + "similarity_id": "a1fa6ded2e6186d02516f69cc904b5d18404474c08a41f8fbed4bbb7db1154f8", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", + "similarity_id": "b009ed5cec288813d215190dbb81b68fbed8aaf487cca891ac7c0f82018afcce", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf", + "similarity_id": "adcbcf40ca30b9377c0d7ca9fa0cfec9bf12ba46ef26c96eb89cbd40abacf63c", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", + "similarity_id": "cad72a84374ca243aa1fc49f55ff07cf2fefe9e30942204191a4f8bbe6bbeca9", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", + "similarity_id": "534530bbaf08c1eb88cd0a31e19d768c5d5845af0606a6ab2cc6ed1a75f49940", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf", + "similarity_id": "7d1d0d72c4e437a486d8e53d198c42b07086f3a236d2069534b4f4b6e433e9d3", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "b97f935be5ab2b2049fe438a622f062c5d7e466ed269f20b24b7bb2d7725bfc1", + "line": 109, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "c1d527f6ba832ca4340eee6001d0d5e3843b2bfea626cc87b863f9c2a2db7115", + "line": 30, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table_association.private-rtb-assoc2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-rtb-assoc2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf", + "similarity_id": "b7b63adb265c9b4f6b3a9e08227630a85811f19fe9c4a50c524f3d0db0894bb9", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "8d24d238306dd69b2aa2af36356f85ade71fdafb7093a171ce58449719480b9f", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudfront_distribution.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", + "similarity_id": "e07ff69df6e2228fc5228e598ea4e148032ba3df7aa33109f7eb8f2a7c831efb", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_snapshot.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf", + "similarity_id": "51a02386182e012254aa94155f280208bc1955291995ce8d05f1e6efeb82c98b", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sagemaker_endpoint_configuration.negative.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "bb5573b8a5cd318882862f7a7546ec80bd9bd6eadb186c65dc0bdae50af42ff0", + "line": 30, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'dynamodb-vpce-gw' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf", + "similarity_id": "13a6e7ab250d5a93866caf906483a6a0cbcc86aa9e5306fab7a50c7e769d595e", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf", + "similarity_id": "90bd1241349c29013df87f86543d4c5338a9de2d2a089c202194529d9ac81b63", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", + "similarity_id": "a26113c4ca1c3180f2e8ffbe6ac65e358359c93856f02bec7388e48a2517fa3e", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "dd30a1007289f96867258b291021c33db43ad8bba51d196a35c8e344df8123a0", + "line": 26, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private-rtb.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", + "similarity_id": "f402c4feca474ab16da283c95b55d68f807647a97711424b00d48b367b1e2d5a", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", + "similarity_id": "59d8999c5b1c0b73d6287ac9db34a2c284426f63ba16487cc3ea66f48456a4fb", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", + "similarity_id": "9b4603fea9b0efded51619af883fadeb4ca8e2796c3cbc317fe015169899f64a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", + "similarity_id": "8bc01381c550271a155106eff2a3eeb4755544bd7dedcbaf8ca5bc3961676ed2", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "0b7d3bb60db93ad3ce03d3ce5faae191a9b8917e6062e6b556b94d9a5ac2aecb", + "line": 95, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf", + "similarity_id": "02c2d91e73e579f962a03a512d2f698f7519c0016142135cf144dec1641e729f", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "6e59023006b47af8abb7e3a03e9e0bc42a3459c8094dc3016839b285a7a7ffbe", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", + "similarity_id": "90d5f9615458a7d30e2749da2b8aed865dd9b83cd172729788cc64fc92d134ac", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf", + "similarity_id": "f1f08f7e1d3d2646727c0cd3a4db61e62a8df136d79ba27ec120b12f56ebdc78", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf", + "similarity_id": "39e843162e5ff9727d5d6514a55d842054f346ca1d4fe5fd057a3e7fd6e3b4ac", + "line": 55, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", + "similarity_id": "2fced3e4a432916241a8f576221a145f064e8f96afbe135e02e3c13db87f17b2", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "92fecf6fefb57bb1c1623b3f669404338bae42b864c0ff70abd51677d7340f38", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "f4d5662d26f3a08cf7ae53d520c7396f8e54b31e46789fc097737cb17897c987", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "115a6fa919db0caf4ba7e70576afc19be9bdf34d0616d9a5c8dbc03a17d807ac", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "3fbe4caa45c9ec45226431bd7079a423f495ae80914e00cd892e8a53f53398c4", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private-subnet2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-subnet2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "1a0a6cac6a33aa36edb8f6436c3ca1fdab04d59b15060e005906f55d46cc2711", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "output.kubeconfig-certificate-authority-data", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf", + "similarity_id": "16df3a8d925cc01b09f526b22a4966c2728398050fea4b15a7c056b679cfcaf0", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive2.tf", + "similarity_id": "e6f48355ee608a1a8fcdddd53787750b458f0d086ae34bfe2fcaea197476dfaa", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Domain' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", + "similarity_id": "63865bc2a7d9cca07948892098d7b8ff70d03aace87f2f54ffe90d2d36f09897", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf", + "similarity_id": "997d79f4d6d6478069252d14b449b1d5087f94ad574f471d04ac57217222708c", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf", + "similarity_id": "1c3bbabc1e9bb856f41a354cf9e04ca2b0d2bd3e4e5264f10caa6ae175cd45ca", + "line": 55, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", + "similarity_id": "c7ed64fbe5dc2463d7795b3170b98eceddf9e1724547e00346122d6581ea4d2f", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "2016ac07936cc7221690bcb2385bae2dee2d5a7b3b6f3c07c20d6baf248ee889", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "5b3f5a784fc0aa797a0c3260f6a8868e6406c3ee4fc72095c7c2bb9cfae4dc47", + "line": 120, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table9.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf", + "similarity_id": "83ab6aee6cb6bb1dc6fcc0feb95e35a92e1de5723a7b9341e22d75597bda895e", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", + "similarity_id": "0fc372e916ff9c31d99aa7daa6bed16fea8cb781b93d135097bd8fd3b0c2ac45", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", + "similarity_id": "c723df32e44bc43710c9a900c165eb0fd6f6cd674f9841f3330724d87736b18d", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "578f053b1fe8d03db644bf8c4545334caa6e110372d800b7dd5f1046aa7eb9c5", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "9ef5b6e97b2fe73c97bd611b3670477e3fcc02087f95eef61e65c9bf9ce4c761", + "line": 43, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "1e264248f099dd9f2f1adc0d9fb46c9a6ff62217f3450f95788a52ce778d080c", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/negative.tf", + "similarity_id": "30b7a404e2378ef01afdec0521858bc08bece75f5f4b4947a1b56412f9262e38", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "data.aws_iam_policy_document.glue-example-policy2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'glue-example-policy2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf", + "similarity_id": "335517550c254c8f28ef87f90ff36d72acd5fc7584765cd49d19b91a27825df9", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lb.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/positive.tf", + "similarity_id": "6fb51acd7dae65fe0f10b45ff3c6a1598d3b1c6e12fbfd1567bdbe47191545c7", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "data.aws_iam_policy_document.glue-example-policy", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'glue-example-policy' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf", + "similarity_id": "5435f54c7d2ab5431451961eeb20b9a840f0759e3a9eb993d6fe6e831c68357f", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", + "similarity_id": "6c5e12fc6e4b1ef1e35b5aa7d7743c375eb00458ccab3581c2179e877ca69006", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_snapshot.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", + "similarity_id": "4b40e2d979b4c375704860f0b6f2a242a16d68e79503b968eff4df35b035b77f", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "543566c34459dc9baed23a1e92c7a91601b3a52b4e1edc2ca2b7167cb4f0508c", + "line": 81, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "9f1561e249110a2eb98d6e0633e8014a3f466b581006039d366375a0edb2b00f", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf", + "similarity_id": "2a3b69cf0d0b38bf2e9fc9b91d3d73f7b560c2a2403b2a0a371a06b59a44fc5c", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "0a4680c4155bf4f195e1de37443114af0af3035b8d1ee80e3359aa5c3782b413", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", + "similarity_id": "a8bbd3aa541be1122e042e27e8a41648c0217b81a6fdcad7e4d53ededce4d28a", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "df324863f861fdc996801fb27c2ac160ee953487f9dd1a3dd2c3185f9449fa47", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", + "similarity_id": "9b80b92756cb3929f9377c92e4a78c31ffda04f50fff6677a2a67960ad261fd8", + "line": 44, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "4db5a0d916116da3db0c2f8b7c3d4f888da53a7118cde204a09835ba874410d4", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", + "similarity_id": "bc08272e483de6133c3972d89d5f5cc697b73f0b174bf95d23ba83db06575d3d", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "6701c8c45247b00ccc38b21f4e7d58e030da5fb7a082edfac3aadbf639106830", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.b.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", + "similarity_id": "315d35b405e64d2f728346b454b8ad3513313f1d965d40572585c59684d99a74", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf", + "similarity_id": "7e6e469548ab15c9b630d93702c192cf750af1824286216858cac6864756f8cc", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "e5591f70cb580b0636318377db81aa893414926a4536d1c2e2b05c83bac37453", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.b2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "52387728fb1b426381d4b03ec2945cdf30f79fa0a25586c5296d025bfb0b66ed", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "ae99cbe52e6ae4dfe3a752ff5f97c6cb479becd538a14016c156150441161af3", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", + "similarity_id": "c7f18bd787ef199d572dc295afc618c81ded903e1547f15021ce435375ccb179", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "8692f7785f63f1b48e79c635a2bf5f18ec124633ebb8e6063b373ab9ef820edd", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.allow-public-outbound-nacl2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'allow-public-outbound-nacl2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf", + "similarity_id": "dcc696a805aeffc368c853524bf2c3afe99c55bab284badd1d62710d2378de7b", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.userExample", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'userExample' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", + "similarity_id": "2305867ad6af7819e9178eac0212185894988341e60c0f274505347e0177cc93", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf", + "similarity_id": "3be9857b94358e25ec990e4471a1758d97a8ce78a36b3345fdcdd22998960c17", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", + "similarity_id": "17c64cf7029f4297d715def886fe9e7d6fc33407a97919a71837b0ffab378712", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", + "similarity_id": "8cd17122f46c7255a99d96b62bfcb258d0d6bc37a5104ec54ce074d37853d80e", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.postive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "4c3abb074b26e247e977d1b6e1f22e799ea6b0ecde5ebec8928f195120cb676b", + "line": 44, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lambda_alias.my-lambda-alias", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'my-lambda-alias' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf", + "similarity_id": "6940f3331000184314ecd23763aa2569eec18bff94aeda9f55c8b199997b249f", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", + "similarity_id": "d3569df7c7089bf700ace4ca9be7b1b47bdeecadc6fc087c91818bd5dc3f7853", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf", + "similarity_id": "8a8aa0027c7f559bf41b69886f952c4b6f545057a731a4d481e8d9aa3a5a6142", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "8727cb1342900da9828e9e40ee067baad48f80c95f12015f797cb5e7dfad9865", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "307133df1a9eaaf2a9a894192979d5c2cce95b469c9a2843208c67ed4a4a866b", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "1c11a4e31aa27b613bdd81512eb81677a12a1bc68a12e21b4bbf1efabcd7828f", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive7.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "3c9eee6c40066f4208558c6dd062ef75c0527be3da1bb5dc64a943491e111810", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lambda_function.my-lambda", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'my-lambda' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", + "similarity_id": "4965ca7963e398ce980f95421aa1691ed34de219ebbd5aef6133eef7ef18c681", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "7b37e20d023bc73ebae63d9d915549f6a81995002e1da35b71e3f7a0761365a2", + "line": 109, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "b378c350f5429c1d55e9a741c825bc33f6d72821b22673cbfbd35b9765b7d1fb", + "line": 72, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf", + "similarity_id": "e9bfdae6edeefe5124f657ec2595fe2231da1c22544702e2dd7bbf3066fbd991", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.negative2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "5f1e8a7f4cf4f400779ceb78c56d1a026046038cd9216eceef633dd78a6b9d20", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "50eb74bee9847068263b1fbaa5ec8a15be50e00083fa6c360b4c5e9a25a4f8d1", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", + "similarity_id": "6700c65754d43b1b7c5af030cad1eda541df170f09a1148217c23c4bcb498b88", + "line": 29, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "35bc24c27cbf6028087431b2d0547aa530801c1950c5826053dc803b6aa219c7", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", + "similarity_id": "7df1c0e324a23ee700498c6437bb4681c4269bf2549fc84f9439d760497e541d", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", + "similarity_id": "79e320d298f675caef40d6834b51859ff7d7e5c98da3d2e5c8a7d53065371a74", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", + "similarity_id": "5bcb4cee3c5dcd2276015396ce014c7f85cdff59e25ac4d965538a23b4ab254d", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", + "similarity_id": "90fc9819639a5011cc4680666a0181719b8e362abf1f8d5b795f871ced034d97", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "79af0142188320b4d4fa10a9c5066d0d39139c8a9cc66e21ceb5920bbcb9dec2", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", + "similarity_id": "6313a2e3c0b81012471fed174fc95dec308473439ef257af0d6fef9453f03417", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive4.tf", + "similarity_id": "f94f311183fc69f4c6f7d065c72954e45caa8ba74be0c7ecd68009a0aac56cd2", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "module.vote_service_sg.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "5ecda317c8ca9e9703591647b06101cab2a9f099b118df11348d8295232a111e", + "line": 128, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "44fd738ac7f4d209dfd9974e416cf57f056c17267944ccd901e8d0ee47224e58", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative3.tf", + "similarity_id": "26d9a4487f88cb6e51d4e86b1759678630375dcb110e734d4caa85a0febc0874", + "line": 56, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", + "similarity_id": "a7318b1050592de8fc3fb2cc16ab17ab036a1f67aa8ed94c4e7029a7c77c44a8", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "d7878d9eb2f59d9967676fa7f9c8a3dec90fabf418eb71a937ffccc733821448", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.b.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "b5beb5a66ad803dca65033e776c9ad4cb4ed31b71dea84a540cbefd7edd70100", + "line": 74, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", + "similarity_id": "59c0dff398763a7cb48d138a04cf530c5fa794272e51deb6fb7c314c157d7563", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", + "similarity_id": "c54d5238ea84469e82c1e2b2c31929dd0dd58f1e8a13ade04fe91b20e910afd9", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf", + "similarity_id": "0c34495723c23ef97668ade169f1ab09afc6672bd3dbbc8703a3d7f7a86c8b6f", + "line": 52, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", + "similarity_id": "f7d216c761e69bf844f8c6aa738ec9a97aadcc0e3ff00bbcdf9d2336614b2ccc", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "2a2a12e5942358a8e43406a8dd050a6cd12d81483179a5ff99e8d1cfa375043b", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "6c7ee2583e3eb7c4fce379906053297bc8079049b8d94b4c4c83155178eb4bc2", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "3a1bc2ab7f01307adba959d593a03ffbb4aed82e558b8fc3c70d859c3658a5b5", + "line": 81, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "7e39d4a96d279e81daabdc90185fe295db8c3bdfea22f920a6de323b8b1cbfc0", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", + "similarity_id": "9fd3ee735208610f9635877a32761b4896e3a1a2dd3d501e8c0cf604f0e6ddf2", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "d2f36bdad7284e64fbeab52855ccf892db7869fa1487e48fa875327db858b8ef", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "50d6ce1290c3bdab1141c9e5f09dc16ad731c4911e52c9ea8adb8e72e47d271d", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "98e90a87c202ec9c754db27c109172c9cfdb9f7074d0613948a7668e65854076", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1_1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "665065c79aae79dd43577837c58312c593ff5850e98d1073c79c48a24bb8ab7c", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.public-bucket2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-bucket2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "e9e1672b6892444cd56bc6806c3388762a75bcf84edd0101249dcaf2a57a7f89", + "line": 87, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.test-ec2-instance", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'test-ec2-instance' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "f0aaadf8963c5f5d97718a01354553608ee32d1420a797222c59f7d974bb1fcd", + "line": 83, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", + "similarity_id": "2cf5c44aea2385f7cb78aece4a2df75499316cdf84446a72820f3ba2a7e6de93", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.negative2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "c71dcc8fa61cfc0acc63db2702b0a31b33bb2302c4aca82012f142677a0de253", + "line": 120, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", + "similarity_id": "b388eeab9faa9631be82b30b45841d72c751699cb6ebb8415e6f512c4378ba60", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/negative.tf", + "similarity_id": "475dbdc0756796195e226f50f66f73246fc28d0671e0a2958dd7ed5a1a8116aa", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_kinesis_stream.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf", + "similarity_id": "c23a7f01ef82b43a0217acbe265b42e2acf278fa30f99c4bdf8ea04e6701743a", + "line": 27, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "ccfc5daf780a3789815c06fceaadf346a147dd09bb489bfeb106edb9407b3d6c", + "line": 154, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative2.tf", + "similarity_id": "38ed35d4d3a02f36700f20092c885c16472af6bc036d8a2c83d6939f4bfc3e5c", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lb.negative2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf", + "similarity_id": "a3fcf3d04197008fb3e7f4f813613df56470885b3e251f4374834cff846fa617", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lb.positive4.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", + "similarity_id": "1500659d619492c204a4a0f7b322096af37cb86bf969fede192390ffc99cd619", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "19d10d7985021871f6033297df82ca5d22b1582839b12f5f83024c731c5cbd00", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "0dbafb3a8863ff274ce05aeec673b3c1854f5616c493be6c97474f5d80d43762", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", + "similarity_id": "ae713279a1e484fbea5893a4654f8c5c8512f1309cf6c11b73c358391423fd43", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", + "similarity_id": "fdfa2c9bbdc0bcdd6295aecb3e26bbdc0d6e54cf3e1b7bad7336c3ed4034e671", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", + "similarity_id": "1751a09807576026912e4b78b26b8396e31e4e8734bae6b3e8b889cb5f272525", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", + "similarity_id": "4031d9e9744797bc74017041774553f93773c80cca47b6b044fa27085038dff9", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "47f3e04d8a0ec915b1f2e3bb3e765afbec536f003daed8102eb3dba2472d0f33", + "line": 94, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'sqs-vpc-endpoint' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "0713351a31886f46d6e90b8d94acb01ca5989eebcc800b9bed88bb5137a6b88b", + "line": 74, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", + "similarity_id": "73edc2121b46fdc84b7d7604b925dd7cfb2256664251f054904d2d9cb707c000", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "086b60bb4f6c14c070bef48f0ccd9ee2b66850e8945a46e3e8ca597fce3cb7d2", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "2eeeaaccfbd6f5f73fbe310b3afd9a62e2608da129055470cef48297c4d3fb10", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive2.tf", + "similarity_id": "3356ec5b8eb065f1eec6765e2209ac7d1c49d6d7110ae1f4aa92ee653301de42", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example_2.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "24e97704b1962ed61091f0925cbcd5bc4a5b1125e1ae2bad3a2d6fd2599d240e", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", + "similarity_id": "ebcc61a27164a010d47be050245a8ff191b806f8fd44351885652cab1a89a9b5", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf", + "similarity_id": "32b5026c966424dbfc66fc2e49a99d954c5fc590b696474084111f9f72f19edf", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf", + "similarity_id": "61513477be63d8ba943737da51d33aa2938db14dc24c3d02a7eabfafa162fafa", + "line": 28, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "2a58b5863b6307644c7b340a03f9c9e14f231db63449673d459ad63b1da34894", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "6fee34612052885b14eebda817edf162609452fa61ed1e8be30eb36fbd6d77bb", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive7.provisioner.remote-exec", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'remote-exec' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "e78c7b2c62dc82ca09bd6e0016271759404f4724d991198aae0de5aad8c42e06", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf", + "similarity_id": "a9ba0ddf8330288eb9998fb5f5a4f5a97322dd69d16f7e17223f37ba9bbc4cd1", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", + "similarity_id": "26783256bab02b2d28c47d25e504869d83efce0f7204fb461df426456d5bc975", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "9ce5ca32d2be8cb4b5f4314a216e0e70861a8c6f1d9c2fc212d1bb78e79a6528", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "786e8be1c2459e36c29182055a1667bc7341067eec4f57087c31691dc40819fa", + "line": 138, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "6a4fa4e9f565d7a4d2dc935e6d126cddf951fe3784f66a5bf0b13e0763baabcb", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", + "similarity_id": "a0553459cd189a443d1cd7551efdf928db7fdc2a22bebfd9c0cd06973d2c64ff", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "ab78a10ac9b26928b3121277a3b56019d3dd5b47dee3631356c65cf3bd057d66", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", + "similarity_id": "9b1feb92247beb372cd45bff6bd53826f5e18a2072d08ec23a5d462d07f804e1", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", + "similarity_id": "17e519c8770e12effc16888f36d1cc90b28163a4be772cda3adbed539da421b4", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", + "similarity_id": "d865634b9d7fec4f1350d46129fa0a29400c4b8eb8a60870847b87d4573ab04d", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_acm_certificate.cert_2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf", + "similarity_id": "7ba8578d93dad4cd4aca7634b4d4f7369a9ef4ac9a3c7f7a6d8fec849c813fe2", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf", + "similarity_id": "865681b89ae6bdd0b67a48a3f86045dab83880633331946003888b1ba91bccdf", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf", + "similarity_id": "a46cc9f8fd0900ff2ee0d26369a66590ba7680006f1fbbc8d7745aff62d97575", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "0145f3e78f8ba61031ac13495d6b874847d3b943ad067f8198f6a2bddd0f5574", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf", + "similarity_id": "5d09e2551e958c561c91bd38bffd0db21e18af2266dc24a40b46ba5b2b7280c8", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "9dbba7097368f4a80174261a25961e02061607a7d703a1f977f367c6fec3caa5", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.allow-public-outbound-nacl2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "bb1ad36bea3ece3f9f013a8aa9d661f3c9407ffa0f7ea46affb166fdc818fd5b", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "60d6d83b0af93cefe084157529684dd4318170927e7fa8d72a2ef5fd0afd1932", + "line": 124, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "2af5a4fe03d492ddb6482cdb9ba9e466228470110b1c709a9df627577b9ae88f", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", + "similarity_id": "0bc12158e9d52c8b79fcdfbd4a9f69491133d3c89f4047a3be5c0f1e2e797bff", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf", + "similarity_id": "ebe2775b4765d5fcb5c839e3b2f166403e2e86b9db7aaf036bfdec4e15c5e572", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudfront_distribution.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "10c0ba75af25933a1c4becb17dfeca02ebc42834bddee2853eb47b6221821480", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.subnet1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "951db50c6b1762169a16b25d2c63e2903d9c2290b300d3d9a4d558b667f5e213", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "a8b7997808a56c7980cf6dc7418f3b256eadfd181d7d3a6b0b42fd8533eac280", + "line": 21, + "issue_type": "IncorrectValue", + "search_key": "output.kubeconfig-certificate-authority-data", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf", + "similarity_id": "535f8bcbf9da96199cad5cc9e489e6fac5655bf595e2df3a34d99dc6d270d494", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "dd38ca482ff1c6c20841317f063d6d47fdc625a0853fc6413afb8e27588d1211", + "line": 140, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf", + "similarity_id": "e6e587afaae6f76ca2f61e611d1df4a9147e7305f4060e939c936569f2bc5420", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "3d94bca96c25d76ea9f1a5ceda19ef7731508bb0146d367d7d6880216d7bafbc", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", + "similarity_id": "cde9a2ba0cd2d31f64b3a2e5eb3d523c9994c07d3ca85444fe485462963a71f8", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", + "similarity_id": "93fc580f957201d5f6ff91befbffa2f245cc8a50abb18e342ccf65abc72e3131", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "3687bfc3f57e70c120f1f281830ea8ec2236d419e8e70ae424950647bc530872", + "line": 21, + "issue_type": "IncorrectValue", + "search_key": "output.kubeconfig-certificate-authority-data", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "8b191b4c530e73f78276ac957131c580821afeaf906b0f0a34b1264b7c37fb66", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_api_gateway_integration.api_gw_int.request_templates.application/xml", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'application/xml' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "8eafcfef5ce81e94bc058735983a7b3867152a8d62c93875545957ee980284fc", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "e0cb274fe578ccba2ef9e68c45c5c8d23ae1ec259da75fca5f6a882bf1e834c2", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "d2b6898c08fd6e18d56623025f8860f938a0ff4e1b468c80b49a15a69b5390bf", + "line": 141, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "796361a3c2e697f13d5850a58bc6fe8834dc8e8d8da8d3a7bf9cd0a8dbe0c7ad", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", + "similarity_id": "0539d229456ae9a9283e17c97a519794c9c175182fe32f47820f98da7179dc0e", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "8f6ca9855836897a2d8dd2742032303594a2382820111e672053ad25cb2cd4ad", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "1fa8f748088eb81af5ef4cfc38dac2cbfacefdd3c89f0c24378719088bb2ce84", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", + "similarity_id": "59df7a4bfb60c69399d31853f248c62c7e65c4af3ffd6ff5bd069ec7b7866b58", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "6e6970ba502f16fdb7c075665b14de7d352a766d2c46c263dd53c2935a722b7b", + "line": 109, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "a39ce5076b8c868b51c3a365f1b1200996f846b329171ea312fbd488db067a1b", + "line": 141, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "e4e52aac31400727fa2359dacc89a8f020640e8b89a5170c6fb0bf7af65c29a5", + "line": 83, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "5bccec8da5485b97289e45302101de755e8ba4e509bc839213a2dd395db0b331", + "line": 119, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table9.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive3.tf", + "similarity_id": "96048361e52f0229a1a0f007f7f87b13589536671b340eaeeadaba680b91ca7b", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "module.vote_service_sg.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf", + "similarity_id": "b01a895d3c2f78e13a0b076a3b1096b2a65cb25d98a83c6c83b1acf7f74eabf8", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "7a96583ac13c4c601573f52c5b8c4783fe96e8040e3b100963894a2678c5c3f3", + "line": 155, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "d34a1237e85bd0b8da1b0f159af81e6580e77bd1e4a96267fc73517404c96021", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "290c24060b9368587858021c60820235b0ffb21194d5c9f9e27ffb7326b07ade", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive2_1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "534d52020b8b62d50f31264d52899df584867067cc5947ed2688ebe7a2d47cf9", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.subnet2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "6d8e7f4e7e86c7fa5553db570235f9b572d7f8df708bd276058f8d0b66c3c136", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "1619c77ad66fc3283a13cd8215d4a0392d36fbc5f5121b22e466febfa1f11141", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf", + "similarity_id": "814bb0d304839447b58a2d7421c574c026e58c6750ec8a53d4d8bce60fdad133", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", + "similarity_id": "51e4701d93a00f6c769b722fb3f730f102f08e19ff8aaf572aef0479b37cae41", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf", + "similarity_id": "7ba565ca3aeb22afb29ccf57192052943c34243394659afe2a7bf93031eaea3b", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "de74887682ba82a259d48ae5b4988dfbfbae18c6fadb4deb5d63bbd8c40cb7d8", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "05401ddc1a4c38edc2470027615a889a75c5e47b5e1b9eab15db14d8c2dfe701", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_public_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf", + "similarity_id": "6059faf1f4de7fe0636491dee6dbbcd8083404accd85c0c04f49ea96743c47f1", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", + "similarity_id": "4c4f88f44420d277b2a6f58b9ee814c57989b1d300cf1663f89e6020cc1aad43", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.monitoring_negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", + "similarity_id": "b09ee313bb93c1cb09fa18a46aeb6878c3951fe7f72c96cb63ac497acb83a7c8", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "69910aa882a1c6bf4131a1f472a875059ca02027f1daafafd086c92691bb08ef", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", + "similarity_id": "d8fda90918cabf8cd22240df33aa517aa2288f4772b41f5bb1481546c1d43851", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", + "similarity_id": "7e41185d1103bf9b5c208e36afd3cd3df4db9d46b5af13dae2113bfbe3ca0647", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", + "similarity_id": "247a223eb12a95581c4abca3a3404706aa8ecd13b7d0dd9c5a2799ac77157834", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf", + "similarity_id": "f1255825ef16b08d3252268918ba10d3a9a74bb214d709cfd703fc4393bd3bd9", + "line": 28, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", + "similarity_id": "7768b79599ca82df2204d6d3e92a19b84b6938a99ed28d4ca223069edaf211f6", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "d5cc18c31b11f5629c2664d404e2dfd30081a2a7f3b085a34b74809fb394687e", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", + "similarity_id": "c18d34ca26d5a4ecb9e0c3196a7b0ddb5db68d8211d5a3d0aad033e2747559d2", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf", + "similarity_id": "661a5184a7bd067625cda25044441d4455b9871ae06b8fefb5fedef16d68652e", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", + "similarity_id": "ccf18e0c8d730fb13c9e865646e25a4d74b1a4df4363f83f23ccd3ce4ab1c9b6", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.monitoring_positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", + "similarity_id": "fe4d74cbe2c2b8069e87929266fec56bf8c0906b0c742064297203925b54a71d", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf", + "similarity_id": "4a9240a1c9d160524ef27c114179c4e6e70b1c62d7e3eafd3003e0c0287ec51b", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "90fccc757a5a158b6e222b2d98ab2cb59523cfab8a273060faca15520cb63957", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "f4a1af720b89ebe65f1d39757dadb99840aaed7b158e2b8463c146f7ae216bd8", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive1.tf", + "similarity_id": "6d9456a2b03df937a09ffdcd98a93ebb6a32fef931911ae34a0fd19882cc6524", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", + "similarity_id": "fda413158e2f207b723acdfc8d5d360ba77cbfe2f70a512f9e9aa78a3a366568", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", + "similarity_id": "280a685aad832b1588fb92d139adc43ecbfc827714c5eeb7e050e51da0f6b6d4", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf", + "similarity_id": "2226b388b5ed87e1f649c05fa9efcb602c73e47ca32dfa9479b4a9d757333494", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "966e241f56dc379851821623812c4d65ff9dacafb489ce07d629a17c2b72c7f7", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", + "similarity_id": "c52f47808ac3afbce72efcf7fb9997732bd3a32888de579ea68234dcf2b5a88d", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", + "similarity_id": "1ebe83b7020d30e1160c5b96b4cab37d9ca97a8f2881472fe36d6c4ca5f7f892", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf", + "similarity_id": "cb7d75e0c0647a3abde82049494fd1f360c5513d80554e3b77112a6f9530faee", + "line": 48, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", + "similarity_id": "1e95d4994b101b5e32dc18dd60e6273947f7126b85690055781a008e9caec078", + "line": 48, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf", + "similarity_id": "897a1f5a3cddbcc644f9672c3015c60515a2177a95611ee43cc17a49aa68e383", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "0a3f149ebfa1742f94ddd4da62fd1a0252ae3b8a2ffe13823ac752bc2003d6fa", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "5e5c011c45bf992ca1c0e946ef4b4bad41051ed3f73c4209c80e0edae6ffc948", + "line": 140, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf", + "similarity_id": "ac217e2028c7c5a0ed93bf521584f165f86644f83e4272e3146b449881048783", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.es-not-secure-policy", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'es-not-secure-policy' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", + "similarity_id": "6845fda5f141490c132da03805391b295803f49ebe2044d974371bee395a3785", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "3c17c0b7663cf62b436e93cc64cb01465c1d907b7d2201e2e3d30b49c6d107bc", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf", + "similarity_id": "22c53730bd093a452802b3c2a60e284a719960a57af699c6ef5641a9e2e54e47", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_alb.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", + "similarity_id": "d3c5e661aaf939bab5ebb33c2cdaea62439f28215261f4e8d951764eb0898913", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf", + "similarity_id": "c9e42c3dcdb8d4229fbfc51add88d064126d202a1f3adb480ca981e49bf21abb", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", + "similarity_id": "3ab313038e15de5a7e6362ac4a2cd78a7e933c2fed23e85d31584572bdf9a4a6", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf", + "similarity_id": "ecc815f005003a2f9bddba2729d7baf07a5b6b9eb0d8725b76911c95c077815e", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", + "similarity_id": "8d137c6a9b7d4287a2d55213b065d8cd48058a0b2795c3d817a1518103ad197e", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "a5594e333c1abded154035adcaea38a80433cc5662ffc6cce3979f2a286418e6", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.subnet12.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "413bd74b0ff0fcf83a19cec882d1728b4f0a7869f22ca74946edbef5858f1c3c", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/negative1.tf", + "similarity_id": "28b1ed5a657f2dc08e11d3227e8e64abecb41c026e44d12da0c8434841c0c10e", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_acm_certificate.cert.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", + "similarity_id": "4ea82e2739203c6d392fadb0512dc76afce1468d9e8cd218673d32434c719485", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", + "similarity_id": "996de3745e0aef295c015a3e1f387e1501402eb88d82194c741d0222f1a7c0b0", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "7b5a2b08e20b0176ac4532dc17a6651e22a0a3da4841b8aa5238cb2ad8197702", + "line": 62, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_private_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", + "similarity_id": "5557f670f3bd973320cb018ab3ec77586d6407db810e337db7d5f669ca2adf3d", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "ce9b4e603f587319f6f15b26fb9e52934fd0710171487325649cbe66a8e5aaa7", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf", + "similarity_id": "54712e918be38f49acb889405d78e2fee1ea5634fe73bca90446b1b52dc9f881", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "a5ae0df3456797bb05983d9e53288ea82f2a989b5e5e828ea5c302459b50cc53", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_private_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", + "similarity_id": "1fa7108e9c0d97851e5894c16f036d6f16c0173bbc8f362c9565b03c4f78ec72", + "line": 30, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_kinesis_stream.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "7a1d8eb9a680a4691cf0ea4015b191113d937e42be8db6bb19f29d31a7844082", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", + "similarity_id": "0f007a9455e1729085dde42e8be9a029be2af3d3db7d8fd9888c1143b22a5fe6", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf", + "similarity_id": "8e906c3c4433cff6db1ab0df4ccea9290ff8cfc5648c1aabbb2105579b7be46f", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "d13e2f8f59828e5b06b6c001dd8c13b229d8c246e982737eb35e4322d3cce292", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", + "similarity_id": "78aa2b2c7a7ed650b37a9f3ae619936f8108c472e6979ddc79ef4dc53b812bc9", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", + "similarity_id": "59474ac310ff3e312c3c5e83755ea79b0491ef1cb94a7e62601cab6ccb2b2bee", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "7af1a7a8f16d9ef6fa0ccb24e87415319c739625476a7333728ba8b970a4391f", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "f1987bd2b09c6fec35cf39af0390e550b503b69cb9bb23d31285c65e40b8c6d6", + "line": 125, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive1.tf", + "similarity_id": "fc353689dbd5c0155f6ea75bf400d851a19605ffb291640d5256ac277626a71f", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Domain' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf", + "similarity_id": "1438039068adec548cb6f8d75064e329e1d47879952102b960f42318f90f1e26", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf", + "similarity_id": "14f33de475da81042f047062655adc3c7716ad3103129905df6dcd071072347d", + "line": 27, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", + "similarity_id": "9aacb8137eb39cc4d1814e42b95d3f420f04d5e3e24ebb43ddd9d737190e6f79", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "1d350da01814403119fe99a5b56fc712d8d0a5a24e4a2c284a00e25bdccfc55c", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf", + "similarity_id": "516a01ad96287f750e48673142d11ecea1506b3158644e602b06015946792121", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf", + "similarity_id": "5c93c1c5f8470842e195e36035d647281036d20e37d7064e06d7335567875011", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "237c385deb9a955f374d9f5cbeb1d983b299ec72916c0aae254a2ac6df91791f", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive5.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "6c85770e140c37d85b6cd1026f56a222e92c974e8b4436967e8586e1a6b056d4", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive9.provisioner.remote-exec", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'remote-exec' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", + "similarity_id": "23488356cc9a8a8e583bcb9a38da6d475687fed5de19c230e88607d27d00e997", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", + "similarity_id": "9b9bc7ef9bf98c5f140fa355a82d07fa71e0e7f57ed25854cbeaf772f9d14a18", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "5cd6e6ee41d5ca6b5375e464175cb57df467ba338a385134d28573bc16c58475", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "088680432b2b90e671b309f40ee800fe0f3f6c4f748dbf88daa1d8c6cacf61bc", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "2257c7935ebeeeed7e3dca56da7ceb31b239af28dcd861f14fc904f822f8307c", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", + "similarity_id": "4f8b88a0b5b2f97119d4110f1c7720d8498d6d649301e8d4b77b3e3165844c92", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "01ab6682483e44c8da35b270ba78316099089e1fbc636f292117f28332e423fd", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", + "similarity_id": "f9074b75bdb9a8b2c59bc02c1d69ee52d8aea5b682b12ca8864f4dfd1d780641", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "a9e9c79f0352a77dce970ff96b136fe437cf4361e5478cfc688e8c3533cdf24d", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "b8ed73f39cf91709def8340811684935697a0c336a51d0a5e5129673cd811711", + "line": 50, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.public-internet-sg", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-internet-sg' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", + "similarity_id": "881383a3d302e15cfae862e935a261a814e35391573778a44ef9428b76614cd5", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", + "similarity_id": "abf47f74f66d46c4593f2bd59d7a28dd7a6613e857438c8e7e4f8b1565d18da9", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "0299bce254290d328037094c61ead9d91f750e65784cfa320b877eeaa9a9e3f6", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", + "similarity_id": "6091f7175c621413c58fc9aded221821ac189094270ab30b1695af6c93fff319", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "b4cbddbc3f08e0e04af779e43310c204b7ee87bc81cc2bfd16b2213afca79290", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", + "similarity_id": "f86ecbd26c6d6f8df31e4a23bc1624a91a261ca53039ba52ef921cd9bc1cb82c", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "cc1f0fb5febd0006201a1445cf2e80ceca05ccff9d628615d2a63eac807cf5f9", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "8d84148dd5aa82e6da577edde1253d026295ce33298d7a758727c8d90f032986", + "line": 128, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "b97b93d0e270367bd986746f55c29d644c4d1a6de1b6b974f64c591290feeadb", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive4.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", + "similarity_id": "e25ef56461f4cfc4a35f0bfb833300a6b67317f44ed74b36b597a0a069155801", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "3a1b1207c276b30a6b7dd204dd92d69b1a6b6dc360a2bc516b0fc2f96ce6603b", + "line": 124, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", + "similarity_id": "0e5f5dd251a8c4c3c1eed56f38e05c74fc467fdc5f3f6951c808d24816742558", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "8dec0ddfec290c778497e7abc4bdede17380ae014503cd7dcc68229324b5b892", + "line": 49, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.allow-public-outbound-nacl.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", + "similarity_id": "a67ad7d78f629f07e1883705e58ae8599c0376aefd83a665523fff1b6bd93119", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", + "similarity_id": "3e3a29ad1782acf9bfd81cd185feb55c1c151144734532dc55c48cd7c25ba244", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.postive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf", + "similarity_id": "5ac7bf30867e4d4a7abeb2e3c7ad1ff8d5f3f730455335907c3e6e80107f78b5", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", + "similarity_id": "0ea51b51a68437d9d04828db1aa144a786086a8fbe7dc7a0d274d4937d8c419b", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", + "similarity_id": "884fb8990831f55c09a918fdb3d80800b4920c806cc516368ee744f8ba111bc3", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "8aba5bc0efbd23ba8aea9c60850cdaeb3a835123c19afef0b92654d8ea5a7a75", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_role.lambda-role", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'lambda-role' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf", + "similarity_id": "35fa9c039f38a765fb4e599851cbe9a51b8a909e4c2181641354650b745196ce", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf", + "similarity_id": "7cd7b030b965ca46dfd68eed2aa656bf75941c7939c351d76727e4bf00d38b99", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "244c45d2cc5700749a37d9782668fbe9a1ea07ffcea1b8086f976ebe3a69c1db", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public-subnet.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "51e0b91b0ae5c7b2ba55f6e9126c084cd7c3324b703255d7f771e392ac97b868", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "b07ba524b51265ff7600fedc1edb1a62679b99a9dedcd14c024615068529ee0e", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "971ba337f9f2288085c8606f33a7efa94188e3494d0228849fc1a539d16bbc09", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", + "similarity_id": "8385903249e281686df8366beb1be4071322a2fbfabcc8eceb8698d2ab49b5fa", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "fe5e3fffe0d67985688482b99a3a6a0b27920abfc40276a69a39bcd6244e7f5d", + "line": 125, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", + "similarity_id": "51fdfb929f1945c31ec986b2efe7899f71788fd143e1533186b2de6820fb090b", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", + "similarity_id": "b0f97b8b5bea6a929c0ca131bf038f85754c671a3b7ce546c0b8de26a1670350", + "line": 44, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf", + "similarity_id": "1429f2b9c1ae90284653f0fc6fd8a5f5be7c4ec53a93c0306411d9fd74ead226", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative2.tf", + "similarity_id": "f8b2a8c00f824b0ddeae1b8fc9e6f4de23c7bce93b7939810691f29318d97fe3", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "module.vote_service_sg.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "16f99359b3c70bffb8ff5da882861157798754723126d753896f61f1e5b2e62b", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "346acd27d0cbb20747438450da05d5534958b1f1a2e09e2f16b60eeaa2fc41be", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf", + "similarity_id": "3bd234eb3fac4a5dc78db03314aff25acae0343da7ad35056d4990dac296f420", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", + "similarity_id": "929f970c8183dd2f80758778ce519f3f1fb1ffc2f7d5e76c801fc8c91902df4e", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", + "similarity_id": "69bca9cd4301fad25737f3fd31ec40cd41e067663f8ef19345c5cff39fcc9b63", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "755bdf17246e6570114eab6bf577ca6f70906cbb734bcf94b58c65de0a40abdc", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", + "similarity_id": "348251ceddf3a5d54a2adcaba310895ff1bf9f065e6fbedc0197410524b59021", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", + "similarity_id": "f0ebd8c0a709baa5e15cdd44ac726a37c823c2d9b3c216590af17a92c8aa3bf9", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "a26bac5a4a656b1b93f8504926dca938589e6deaccf955c507fa328056f160db", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private-subnet", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-subnet' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "96f546c328b671362308c95eb60a5058f658aa783a826fa0886030f9cacd7853", + "line": 154, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", + "similarity_id": "85bd9583cd68b68ba4c4e1d02d691450fd67ff1205b28cf5fd0514599fcc3281", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", + "similarity_id": "17d941f780e9b573a11195a1486e4442632d4f6316f66bcfe4fa6cbeb6ee929a", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "2aa7d3da65a556a6f83955b30c3dc39b8f4a19039f62ceace153891e326ca553", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf", + "similarity_id": "3e9790f01ef4a507bf67628892de9bbe569f54a13b61988d7698d684005ad4ac", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "dceab47076ce6cc729e99044b4f4058afbe381bd12903408f18b52d1e825708d", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", + "similarity_id": "e8925e812be454f72e8414c984a7069d01708911ba789b1a397e2388f6513735", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "b839bf4dd2a0ba1972a53ac741044af0c29f0b2bb284e42140835f174c40672f", + "line": 103, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sqs_queue.test-queue", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'test-queue' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", + "similarity_id": "c01cdfc16065f5afc95f76a609b5abb14234662b6c31f4bc4465f42d461c4ca8", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", + "similarity_id": "de4c6414194955b94a08151b094ba30deeeebb73f2baa4e43c0171ce0fce91c1", + "line": 34, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "4284323071233b6bc105046bd70d89a5366894f21eb165bccfa7ca671a2e3100", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "b342c95db84b35265b809be3ce99c8f2476be9cb1ba5e6a5feb378e06cc5cca5", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", + "similarity_id": "a9ae1578fdc440251309f785aa6d04323bde53c17eaf0aeb6e40c111abc2ed4c", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.monitoring_positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf", + "similarity_id": "6e85544bf3ca1733a04cd0193415955b56352017c4a6c546085ecfa324410395", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", + "similarity_id": "49b711336aaef0a47a4f83e67b8a9ac43dd97a6b679b3ad5b2711edab751f593", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", + "similarity_id": "36ec454eb71fbafe09b93c9182ac449fcbc4365146bacd601f5e3ab4660ccccd", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", + "similarity_id": "73f8331c923c1a1cdbe7ed7c487277eef1535331a3a0dbad669bbaecfa396d3d", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "42f20fa8af421ac9a575c2291a3f76e5dea2b8bc9d14521986495b31812ba6ed", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'dynamodb-vpce-gw2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "7412bc25b1411dc579ff7c4a7f1e1076e2968b2ca2e0db59d0d8c53ce732ded1", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive4.tf", + "similarity_id": "08f04d68018af2808b97ebddc74e895cb7e1658fac24d700ead7c92deb09f847", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example_4.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", + "similarity_id": "4a083d8a09cbca91dc31b3e1a878c008783b6ac4b5407f4bc74127e3728a0153", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", + "similarity_id": "1e5d2a7cc5e055cbc2c99fbff96c21c4057b0ffa2eda8b30b7b3ff27d351fdbc", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf", + "similarity_id": "77200d3ae45d1f5673f4dfd85e3e364b5e70bc755fff5ac7b649e5ba663ecbdc", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", + "similarity_id": "96cc8f06f61f64abcb6d7b2c350570ee1d2cba2e13ead36e95cfa65ee3c30239", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "a308857f8fd065d1aaf0db41d4fbbd787610cbdb4b96f0212f4a49b5a72fa91b", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf", + "similarity_id": "a4713dc5892d94918e91444a433f9f1faf7b88d8f2817a5965f99c28a828f7bc", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sagemaker_endpoint_configuration.positive.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf", + "similarity_id": "42c375462901ff2a45815aa7fafc5b05ee32f5742a4fb680736d7ab2fa849126", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_api_gateway_method.positive1.request_parameters.method.request.path.proxy", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'method.request.path.proxy' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", + "similarity_id": "453c396ff120e84c690b7be23e2cb7453adbe7f4c0c1c79a042a68e9b3f84033", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", + "similarity_id": "6bd0ee3ebd17cf08cd00ee69b6dbd56dd4fe3ca4ac5b410bd69ef827513c58db", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", + "similarity_id": "2fe696dd55f03e7f8eef154ec5dde099f469d4cef4d83aa0ba7ffb102957b930", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.positive.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "eb5533df2f2a12148cfcf4ad3f10fa62e9d7de62883c8c2e31803f998bff426a", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf", + "similarity_id": "db6e59040382216283edb5e53eee761aa2b841070ffbad1debfd107fef0d6f8e", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_alb.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", + "similarity_id": "27fed3a9156d4654e316ecd8873a367b7bd9cc1294d0bc3113efcdb7d0ccdbd6", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf", + "similarity_id": "ad96a9969928025164d56f62846468d03f99b04c1eb41b1626a05fc418cf26b8", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "59cec616e1a18b2395a5e78e82ac4fb26750e4dd9853b5e0b856dcf3c6770fd3", + "line": 74, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", + "similarity_id": "f1111e12ee7ed489204e3d10866de884356279e3073b3c9e6199babd2ac241b9", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive1.tf", + "similarity_id": "e78609b6fd0e71425961507ed22ed0cc850652d346edaba272be5d8b7b1cf572", + "line": 3, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_default_vpc.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "939c7406aa1510363b522b666a0099468cb172bf316427f5043ce26ef81ee1dd", + "line": 26, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private-rtb2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "0c4f3a5317ce6167a485c731606c043ee492c70861f8848d44e641fc0f84d2c2", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private-subnet.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "3bf42280dae049b4ae42514be9f750073894d04fa8692ce47acfe8dac8078ff7", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "bd52d6975ec405299356bf36a5a8bdece691750c1d88623230ba3e3303055d64", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive8.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "63b0ef5062829e4b428e2a2b7da8179ae776e04cf6c4bf29a9a775fb039aead8", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.b2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive2.tf", + "similarity_id": "c06ba30eb2aacd28485fb9992d9ecb4f8961be2f0e96921cd6a460535c696c62", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.positive2.tags.Domain", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Domain' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", + "similarity_id": "98d6b534947abc0a21005acecda6c0cc7e92eb911eabd37c1dcb60d31ec942f8", + "line": 52, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_kinesis_stream.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "a38369fb3a5355b6d831c0729b74eeb92cbed9a8c4af110c072bf27da6bbc6d2", + "line": 43, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", + "similarity_id": "c39b340b17d328ab3523f92110d71395356a8b5a699bd72656748be0a5f988c5", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", + "similarity_id": "7d3196b48567e3cdf8b843b452ca3497ab68f4c79d7021d3b3f1691e1cd6bfef", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", + "similarity_id": "8ed2747a543bc26a6c11be518a9ae865f90f79105d163bcf811dee88ba878120", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'sqs-vpc-endpoint2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", + "similarity_id": "cedb60c696961f34adece5afa6d71abd2afa0efab87d411dcee08ed57f8191be", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/negative1.tf", + "similarity_id": "7471ac636235974240303c5f89cc2a22eda718f926e99987a631bcebd84b4361", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", + "similarity_id": "ea50dd827806f9b9941dfe91709dac6daa64479f8590e3053d210762e1cbfb1d", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf", + "similarity_id": "2079cf232e99edca125015d3625bf4a553a4c6bfad58170aa11279a30e8710c0", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "3998381bbfece72857c646ffb615364f55ea6b5e628ffb41bea3ed4765f39693", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive9.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "3cbe90a5e5f9d7fca04c276c741668fab16371041e47ea0b6328b1600a92c7c8", + "line": 155, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "a552fa828e5b13220844efa1dc9af2bba6a16879202d7927040cb8b457132d12", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow-public-outbound-sg", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'allow-public-outbound-sg' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", + "similarity_id": "e24abf92d3904ea6f742530c02085c6ce6a0185c07848524da4bfbf02cb3566e", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", + "similarity_id": "77e497e76926f3c56e14c4d48ce0edb19a02c018899fb690f212dcb8e4b7a968", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf", + "similarity_id": "4e8832d61f3c8220a4678ad6a81cf6bb30d7c69aef032e3b5aca411659893858", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf", + "similarity_id": "c2b2a8ade073d489fc064d81d2a7f2b1a0a4e162514d402f06479ff95b7de8a4", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf", + "similarity_id": "59dd7e32da16aa09a18c6df71a4cf20b73699642f07f82c99aa263bde8bf7b68", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "031881bb4492874b6300913defab119f3370236355f55b243d89e154617d2efb", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "83432e2c53c8b9aeadd40dd82ed778d4f1daab01329bfae29d31d29a423f2e67", + "line": 90, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "33dbe35137e6431cd5f9fa9a0d11e8404bf7aae935c280620d090a71a1263cd1", + "line": 62, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "4f2d8819a20263f5792b87febff1219b6cf2c97ede516d69a4ebc52ae7b4d68c", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_public_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "e174a63f98947437c39f4708be33e855c67f03ebde8ee5c3c0c935d5d7eb3b71", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "4ebf726cf97dbfbbb362264bce2629bd8e7c003bc2deda0c6fc721c723b37755", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "output.kubeconfig-certificate-authority-data", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "85bca752ac9b3b8ccad0f9f993e91172a5f7a2d7763979244db0dc2634280a75", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "cfdd3a66d4359735adbe4e444fbe5c4f4aa76540f26571192fe46b4f057fe0c0", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "819242a879b899ffa0cee9555afed26f2a0f1a183bd676b0351c05ae0d393569", + "line": 43, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "110dfbd065a4ea1384a903320ec95e2ed11393caa041b1c1363dde526c809856", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "09fc4b59a9f4ec84ddcffa8ef6d1fdf932733645427629ef3f0555a3252b1b04", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table_association.public-rtb-assoc", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-rtb-assoc' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "4424916e57155cc434cbb9af97eaab909cae02db12a80a0d118450e056bd8998", + "line": 139, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf", + "similarity_id": "f9ab8774cbbd640225ff179f967078c17cb2ce068f2cacb9bbffe85fd7dbf6af", + "line": 56, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", + "similarity_id": "17ac669dc753a0e818e40cf12fd235f6b5ada51ddb280cfe6d1c47ba6fd0b568", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "5f660ebe2a3f7af747379cb7eb4d15532dfddc9bf6b2a0046c379642e96f448f", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf", + "similarity_id": "e74af1af9a679cdab3fa52406dcc1eccd79ca59fd5237bcb3097bb1915ea8d45", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", + "similarity_id": "fb284e794fe6cff0fb65c8e5b25d8f724bc6ace9184fa1dc21219893f8ca2a99", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", + "similarity_id": "83da13b1e64eeb5cfde9ee9183bd9bf573e3fc42ac4a4e716378dc54de63dffc", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf", + "similarity_id": "c869335e626d8f4a83f67d88fad992441847984c9bffaaac14b15e5cb6bfda51", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", + "similarity_id": "e5dfa07a43773831c06c73bd233327d02f2d8500d00f3cba3d10e124c8af1967", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "435517ebf7098a7a6591e655cdd0edaf087dce1b88ae05bc096135c53f918dc7", + "line": 43, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "c5e3ae193b2c7d65ef6f79dd8b7133c77552dedf207b57b2ac2bd3452378abe7", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "4b24f1a5117b3c47e61bfe514fcc00fdeb17f2a2031530a147562f2d9604e3aa", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", + "similarity_id": "c471f89017099d6958b0b2a006546532a831e5916271d4a3317303d089411d29", + "line": 34, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf", + "similarity_id": "82b9d5d6f8774514a9bc79232b257f0e1def4fe06ad5c4a28a876d8e4c260cf3", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f9de5332b5607f47780cd9e30670a59f641cf80272781596dabb777799f8bf07", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "b5a7fd1c89f081acfe52b3c65c39e44cdfef3be4b49dde0b4f0140c057f12cd5", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative1.tf", + "similarity_id": "f69206dc3763f31f1af04ea36ad378b0b825fff61897dabe0bbbcf7558009942", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_alb.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "9c09b17284594759e4e1cbeadb205ea4d49c35d4a9a9b2dfa0291c7fc3e81778", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "943e0501da7e97693706e63f68cb49a37623da64e1997f9987f8b13be49635f3", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "a887f56cab3b06540997b3f969cca6a3cf3653b17589e58eae01e37a9423b51f", + "line": 138, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "575699d258d9c5b53d96bdc04f862d87d90ecabb8be3b2a95a68ea9175c8f16d", + "line": 83, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "f21ca8b17304dd763898d05c3c3d8b841ccb4e03ea45cf667bf8dc8fe2c86917", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "b2aed6f29d22ec9c89b7d0987ebe324bf8a5c1663a315abb9f970197e871ff60", + "line": 72, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf", + "similarity_id": "09b99e9bd1aa7f95998ecdd1816d5594381f2e741258e1ca25b0d4621dabb40a", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf", + "similarity_id": "c48d35cce6fc791666e9872dbed0e75b16496f13b13c8e1fe1ef67594a08e548", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.not_secure.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf", + "similarity_id": "7c06cce6aa5bf47817df325e8d30c5a41bb563743a46fe3f93a5ebcaad42ddca", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf", + "similarity_id": "1d76d23dcd7f40f017b220838a13877514708e1cae2cd0aaa1a96495d45444dc", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf", + "similarity_id": "f1e2d7018aa155626aee03ff60b590ddc43a0c8c01f0cdf50415fc46d3e844d2", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", + "similarity_id": "6308f1c09f4f1a2c49080694884616307445d0c83e8fb726e7ad68d3daac635f", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf", + "similarity_id": "b2e93d03d485c97fe0358d969b678a10d865edb9d0e9770d6d4c06aaee099251", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "e3a8d019d0604242fee6fddcc6f020a29d14a5c0e1b4b3e06af77b0283ffa291", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf", + "similarity_id": "8c0d2e89ea9a32d6b2bd9779aa116fa16ba3fa41b128c9870ad2f1f437e5513b", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "dce0c3ce51368c2d8224c0e3015d11bf6475f10393805d6f8c5e609062b8364d", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", + "similarity_id": "1c9145864f61e02bf7358770b06b5656caa7f32c7e60c300c5204116777c44e1", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "7978545e23d34636cf7fd8cb04ac08190761afc582619c16eff2517c8ba78e73", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "c4906d9d9e48b34bdcb435bb4998a0e5bf4d701a76299abb96ed1861ee3d0eee", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Root_Account_Use_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Root_Account_Use_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "f1da668d4d068beec42ab936262ed8c20a7f05969713cba47459e79a1dc26579", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf", + "similarity_id": "8f1347c3e9ee906de14af43028242063eff022d83ec30116354cf5053b855287", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "9ed4a0099ae03998c9c9f68a17f062556c958831102604f9bc571d0cd77e5e33", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "b0fce6713d19a762fc0dbb3c8d60b93061877a82004e9ef673abc190b4296e8f", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", + "similarity_id": "fdfbe5f1dc4c40874ed0afb62780c9c24aba28c4ab26e963d8fdae62c3d0b5e7", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", + "similarity_id": "9614f8f17fcffbd9f4fe2c135b70ed432f0989336d222fe098d9a38d9c07954b", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "caa26eadde0c2a8a18c028b530c37f8ba29d24236f55fcb5189e1f4fd161502a", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf", + "similarity_id": "69a8129bf9c3027161520db6e269babe57bcacc1b326c22f11519cbf7b679536", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", + "similarity_id": "63f9dd457a62cccc5575b12755a0bb040dea11999f0e2e591218bde4c5331a74", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "ba94335c337eadb74fd88c73d332b0697d4f468cdfa5782c0adb4079ddd18545", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "a08c0d8514692799d1ca77e755dc9cc5d9b3a9ce3cbcc47a5ce7c5b00ff3464f", + "line": 104, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudfront_distribution.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", + "similarity_id": "d78ead0ef2f3187e592e934a20987acbfd502d94c3870fef6048c950cc5358cf", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf", + "similarity_id": "57539d55fd7928bc7812965c11a25666dc1ecf67ab045e79593eadc684dca803", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "d6be5cf2a7b8e7af547d08fe450f13d708341d129a49541f4162793402152fb7", + "line": 74, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf", + "similarity_id": "ef717a745662f6b7af47dada20523a417c9bdc77e39001cfa4e4432d27bad4e7", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/negative.tf", + "similarity_id": "17c379f004bf49cdc2b697667e079fdcd71502410b5406fef85530c5ca66ec99", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_role.negative1.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", + "similarity_id": "e21402fe5c2421b651e2e42826eb7e5e3e2c5277a6bd3d3580eda1e73f8f9773", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "9d5ccf4a45e6116f4848841015e4685aa7c099132d5917874f6a4d7650a69274", + "line": 119, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf", + "similarity_id": "d1e86ab3ab02b04d771934fabb03d968c9a0b2288858a4df7b2c026dd6a81d91", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "411772c66dbcf4b8153d6328b2933bcd5bc69a06576c5d14a805ad94bce7265b", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.allow-public-outbound-nacl", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'allow-public-outbound-nacl' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "4aaf805eec7747d7105dc9f24d56696159d71046f8e42aa093995eb99ba37458", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public-rtb.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "2daa3b1ad23ebbd0374fe99a1dc7b9e0253f02af5669ba87db6645da74122030", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "58ac15137abcfd8fd8c93877632f209ee2f1083c18cd921d40b1f47086674a51", + "line": 49, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_policy_attachment.test-attach", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'test-attach' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "5c245006fec121466fa24e2c8f0af2eed5c6f741a9f7539f9706c861506d7f4d", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private-subnet2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf", + "similarity_id": "48f8684c9a856db56f1e2bc7be347dee89fdde3bb0db344c633f296632d5fe29", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf", + "similarity_id": "063674bbee29646ef1b3796731800f024b3ded6e818a327f51392845cd048a21", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", + "similarity_id": "7278ea934f5b3a38ecef69a14e586ac1fc23033f8172ccf1c4de807c42dae6a1", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", + "similarity_id": "dd216d3f43ee7645670a1a2a52d26ab2d820575712efbbf08e43917b8f8dc4b3", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + } + ] + }, + { + "query_name": "Neptune Logging Is Disabled", + "query_id": "45cff7b6-3b80-40c1-ba7b-2cf480678bb8", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/neptune_cluster#enable_cloudwatch_logs_exports", + "severity": "INFO", + "platform": "Terraform", + "category": "Observability", + "description": "Neptune logging should be enabled", + "description_id": "eb6f1a3b", + "files": [ + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf", + "similarity_id": "1c0405bb165c729dbcf6a049168924129e957282b780ae14cec0a77c49e669e9", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_neptune_cluster[{{postive2}}].enable_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is empty" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "74b61a0248f5b1c22247d01095ef54452124c2d50ad0fc31c2509e2ed56006d8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "f2e76817dd9d5dd5f97d09929c81be2730475ce362b5a3414ec2121f7d9193bb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf", + "similarity_id": "b0a23be2719bf75e259cec51212498cc32119c416b87a38465fdf426432db289", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_neptune_cluster[{{postive3}}].enable_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports has the following missing values: audit" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", + "similarity_id": "2ffbb813e704578d0874665cd6275152316b23245a361dc53f27963f8d612472", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf", + "similarity_id": "3e21e261fb043b2d6fff900f0d25312e83e37cace0f03ff7a2eb19dfc496e771", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{postive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", + "similarity_id": "a82929c622f9b84eed8cad39c223778026781554a4db8262faae485aebf9a049", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf", + "similarity_id": "3baf10ca64b00814879bfd985fd3f54c7bd7b55d8e0d3a631281caf2ba9d3065", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "7ef86c307b58cb6cd56444c65571ce0c96cbe0d814bc0c1566a734cf37e20c76", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + } + ] + }, + { + "query_name": "Output Without Description", + "query_id": "59312e8a-a64e-41e7-a252-618533dd1ea8", + "query_url": "https://www.terraform.io/docs/language/values/outputs.html#description-output-value-documentation", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "All outputs should contain a valid description.", + "description_id": "81535d16", + "files": [ + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "4fc7c041f58201f74de9e2bea1d2b12a94fa574fdf1c7f8979dea8fd9ec2fd5d", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "output.{{kubeconfig-certificate-authority-data}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", + "similarity_id": "af33bc55f0f3d18bbb1363e1e83c3c8c34f4ef4ed4523c388a7951c8db38ba03", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "db8ed9060a44bd2205a3542a0804a07248115b98f18cbf7467679b91fb78ec82", + "line": 43, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "06956b3babe23ecc1f80146332881287afee675a20d22a3b382f5c6fd70986e7", + "line": 43, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "cb2f8c556cbd43cd976b190bd8ae3e09d4142a923ef7cc73d4ac94cd19d6f2d4", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "output.{{endpoint}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "80a8e4f10d12f6b39d600bcd8c9adc0ccbd8285c063c57729c0ab20608801e7f", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "30428d93436ac9002bddddd66aebd9318bd538b5b7f4b233db0259ffba51d3f9", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "92a9771d91987231734d620433931239d578250ccac0b96ebf0e838e08be04ef", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "output.{{kubeconfig-certificate-authority-data}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", + "similarity_id": "95be5a87221ee7f9b4a91b2f615e53de707298ea43d5e6a4504c4f8a40cca308", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "e2aff156d721fd96ccea417a09049f1682e09dfe17034402412ddc62b5e33edc", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "output.{{endpoint}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "8b9276533071393939dd994292c0c5946e4d0223df6a424b2fd4b44aeeeefd8b", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", + "similarity_id": "d8b9aae21ce6e4a1861e29548946e0d9772b2d374b643867ba1b7b9f6c4eaf81", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "7b8df4fc3d84b48b856c6fa43b6b73d0e784f325e598cfc925da2fa72c731a62", + "line": 43, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "f7a65411846649dd32cbe30226bf159b8d741db535ac4860f1fae09e79a42f55", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "output.{{endpoint}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "e178d35cc297562df7f46110548b666df08d7dcfc246246cf8497c0355be3432", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "output.{{endpoint}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "a653c6311fd684bd2461ef1338637585d123094578fb3547c906d991348f367a", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", + "similarity_id": "9ad5ea584de1abb57833710cdd574a16b7c71e326c60bee3c068ade6c68cf2cc", + "line": 42, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "d3954dc0a3f748ade565c4dd77e0bd4b68d2b5784dcad49202c866a8fbad528f", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "output.{{kubeconfig-certificate-authority-data}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", + "similarity_id": "3216bfe89f9bf5ab2a4351a59e1addeee0bdc97d7a5d87ca6f239e23644c4b71", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "ce94234d145740edc20e7e0889b5cdd28fa626f979d909b416f8a76fd8323377", + "line": 43, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "85b64fffeb3d57265b2304fa679c516310979eca96aaa8a60978af8a7c388040", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "output.{{kubeconfig-certificate-authority-data}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + } + ] + }, + { + "query_name": "RDS Without Logging", + "query_id": "8d7f7b8c-6c7c-40f8-baa6-62006c6c7b56", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/db_instance#enabled_cloudwatch_logs_exports", + "severity": "INFO", + "platform": "Terraform", + "category": "Observability", + "description": "RDS does not have any kind of logger", + "description_id": "c499a58c", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", + "similarity_id": "fae9533d0141a1f5f27c25c3d989d3cc13e9247278f763de1847ed01a13b4eaf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", + "similarity_id": "9b2222c63cbd7b17ca8bf7a2b6f258a250066e38065e9ea6c5b905cc705088f8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", + "similarity_id": "d27a4c30e24efdc30d70bc68deff163ec44739d827e984586b7e88d3f6d3fdda", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf", + "similarity_id": "6008d8166b4e4cd74c3985797ce6373bc8d1471693d45c32a65d64bdb9a9595e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", + "similarity_id": "b0bb0c256dad02137198610fc00c38c264ec1fbd9cc9fb815818d7a72fe88a3a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf", + "similarity_id": "c345799c7b93cdd832f5c493ba89d1b6d318753a382d479d36cf6f373637723e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", + "similarity_id": "c7f051a2a11d5293c0458b5bc4b93b7cca93f05fe75ed270dd3ae9e88190b74b", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf", + "similarity_id": "0560239b87e7432a7473e4a7a6434692e6438112029299dfcce2477dc1300db3", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", + "similarity_id": "450de690194a193ff6ec9bd92a5cd9d638c16d9a2ee73d4ddb5172cce2be38cc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf", + "similarity_id": "ae161e836a9425e161ed99953924cef014718b78c5fcca63106c89e8610075bf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", + "similarity_id": "ea9ab37a6e126a1cc7c1e64c3e7d1dcdadb31910f0fadace6521e763d11d1fe5", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf", + "similarity_id": "2099960e139454a018ec5237b0837cf7de6431757cd0bdfce4f841d99f6a90b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf", + "similarity_id": "44a5d3a6e9aa75c08d153dd96bde323c36e157fdc833ea6cc29a028edafe1f13", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", + "similarity_id": "b17f557d3a41f534d9d9693c5678a67c049d0a75cd9dc4f3f14996a123792d8a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", + "similarity_id": "32e011d1ce59c6be9a1ff8cbef5aa13189167cf640c8df575c8f07a90bf3dea3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf", + "similarity_id": "0d27962ca3ad069e9a43cc4a8d226f224af24b06fe21b731a71cd0cd61a88461", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", + "similarity_id": "76f3ae2fbb71026388ae30f9c3ff5b059e91ae1eb7895bc0ee2973345043343f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", + "similarity_id": "6b236bb26377e8d80d11b922261bdcdc88b145f556179ade9581a091bf9bb298", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", + "similarity_id": "4b341d00fef50044bc30e53de85bdb9f8f224d6600486b02b2801cc1c9c88d79", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf", + "similarity_id": "ab4ea2b0f47883fcc21ca20ce3eae27404ee77d8bf651d6638179fb647cbe139", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", + "similarity_id": "d7edee056023452965f5799cebf6b8f1b354a2040c1c0689acda84728ade7a14", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf", + "similarity_id": "ecdcdf6a885aca6c1a6955efad12c83ee0d5eb4b3474ceb4480f1b344086cc07", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf", + "similarity_id": "da2f5c78ef84808e50853093225d89b765ed3b2c37321ed8bd063393ec2bb9eb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", + "similarity_id": "389fff0ebe63dcb2fc3d4cef5dfd627cb8b3dc521adbe40488b3a4b1d8985661", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", + "similarity_id": "7841895e49f3865411fe6cb8d454f699e8abf396abc62301ba78c340a7de9752", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", + "similarity_id": "5751bb7505921720f1e5b0603c610469123896384d83ebead2158ddc6cbc822b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", + "similarity_id": "3883937a795b21efeb982e2777e42c758a93e962f5ce6f1317a6c4e2fc5a37f0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", + "similarity_id": "08d252bfb9ef37dc1b10148b413edef594a396479ea5384e38cb6d7b6d2a76ad", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf", + "similarity_id": "f3db60a0220d043c2456a96839f74e3937429194b44d3cbee25a8117f133c9bd", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_db_instance[positive2].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' has one or more values", + "actual_value": "'enabled_cloudwatch_logs_exports' is empty" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf", + "similarity_id": "03b5c7234d8c9806924fd3f2e6d3258543178da27008ab0258246f78a335b56b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", + "similarity_id": "b12ed983003cbe29dd0ab54b1726cc1ee8db5c05244a78206d8ce47232fc7e7e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", + "similarity_id": "0131772231b2e7354f3328fd1a1b466964e8182f548dc68b6ce6ec311f868258", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", + "similarity_id": "d641947cb6edd7684192a90891b098ff9d283f0213909a6bea1c040f540c8233", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", + "similarity_id": "2f600b61cc9f99c4fcbb6eaaf4262a918103754a4858836398f18184eb4e150d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", + "similarity_id": "70f32821ed3dc3b831fe2dab5b4c818df3392c3f08d1d36c13e21f85e3d9ab28", + "line": 11, + "issue_type": "IncorrectValue", + "search_key": "module[db].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' has one or more values", + "actual_value": "'enabled_cloudwatch_logs_exports' is empty" + } + ] + }, + { + "query_name": "Resource Not Using Tags", + "query_id": "e38a8e0a-b88b-4902-b3fe-b0fcb17d5c10", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/guides/resource-tagging", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "AWS services resource tags are an essential part of managing components", + "description_id": "09db2d52", + "files": [ + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", + "similarity_id": "7e02e8b9c0dad3c4fcbab64886412a41ec2069f79f82b3174a452d175f999008", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "83b2ee7077c3c1c5eedecf44c2289d7872710dc6b780112f7c1eb7a5e692d21b", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/negative1.tf", + "similarity_id": "8ca9b71db695394745d2d2b7d8a79ceb249996d8756bd7449e3c41d7896d0fe6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{postgresql}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative2.tf", + "similarity_id": "ca9ef761f3ec26ccb07d14bd4237e954ad0a4009667ebf0c94ab2f18931057a1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{negative2}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive2.tf", + "similarity_id": "2ead60d89418bd040d676dd9b82c091ebf187d0e3b57abcf94d97e1dce441e69", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf", + "similarity_id": "e07d18b15798e084cae85eb808b161b015d33d364a3c2267eb2a4cc92a5e862c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/negative.tf", + "similarity_id": "e2530a639493c42cd482b59c112fafdc91e90c62f1dbe0784db6afb4c56f19c8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "ba0f53d25ae87f5895a00fa8254dd9778783a90c0bd1f68e47b62b4bd7097eae", + "line": 93, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", + "similarity_id": "e26bae590f859e175790269f07fc770a22df0007302d44e14bee7e00883b8819", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf", + "similarity_id": "2a3ab4cecdcbd321696eaf03a9057c2625a1f6df278105667157ae7b31ff8721", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf", + "similarity_id": "4c900b48aab13fd27a83389d1c28863c1db6541fcd3eea23b085545e762ec7b7", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf", + "similarity_id": "a8a666752449204c1d7a68b54ad35ddee8c557877f99db7f692c57f469a71455", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive2.tf", + "similarity_id": "506fab471e61b74698da6047c53258782ecc95522b8814d115abb4de9c092735", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{test}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "ea20b106920a54c26d8511e0d6c14280d34dea902914b3ca9ab661c25c9276c1", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_route_table[{{private-rtb2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route_table[{{private-rtb2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_route_table[{{private-rtb2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "846840191ca1916ab5a63b75f11a0dc52ebe4722aab0b2a11ff4697240bfcc1a", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{test_role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/negative1.tf", + "similarity_id": "1b3324f7c94b6dede2dcbbac6b3e1c9b082bb215f099825d697b3a460c189d47", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf", + "similarity_id": "b3862e7d41f123f8eaedb4e8043366cf026b859163fdf23752a2b9ee65337849", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", + "similarity_id": "1b69624c85d46670f4e61905714b5965759435d27ffe23b82287950fa86e5dcb", + "line": 34, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{postive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{postive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{postive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "5a1da4e5ebd82f085d5063a928de0bc78c30cf758b48ccc633187fb8615eaa87", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{vpc1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null", + "actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/negative1.tf", + "similarity_id": "45c14ed492322458ff3e44a37a19979c70049fc035e8023faaa4c613f4e07525", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dax_cluster[{{bar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dax_cluster[{{bar}}].tags is defined and not null", + "actual_value": "aws_dax_cluster[{{bar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/negative.tf", + "similarity_id": "7165497ae13105fd68db3206c5be60e34c0818b7dc65ce7e34827c7a1b9c89bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", + "similarity_id": "00c83f43543c3c7a77d330dc5c9f986a2b9dfdd513ea21785539da20a02411a6", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/positive.tf", + "similarity_id": "a68e17569ce907a9f53029de09e80e04d7576907afab4e1012b6c749605e4131", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "1a053758462b24cffe82cf6b2d79df4806f7bfe255a1a445edcf635dd28b291e", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_usage_plan[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null", + "actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/negative1.tf", + "similarity_id": "4f79e64c87465132270cea917f66a41d224491c3c0569f455312dde04c85e0d9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "288628148c1dd8a1ba828981f1ec7e85e8d4a1351d55515a5f860d2f58499274", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "e18137ffdb26d7ead65d13b9248fb09e2b0b6c7e25b4b8647d9ffdc18f5507c9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf", + "similarity_id": "47ab5a5a4c2c84ca1706eea63347914963e30d926b97dc98c4c7d77d3f19d605", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf", + "similarity_id": "2c9d8ab0af1a1109813eabceefc41829b6044967357f654709650c51995c47fb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf", + "similarity_id": "52ec09e42c16a3fb9cf0e75889765c16df350632a2f0383fa1ad09b94e762a52", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "412c119c5698f2fb69bb4dc1628d124c788d0d56bbcec2bc94ea0ff1688dd0ba", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", + "similarity_id": "47923349ae643b9f667e24b018908eaa66751e657c646db0d98bb7b72b0999cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "fb0a937ddde6135ea46b356b1e9a1104eda37601027dbbb488fa80b174c5745d", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", + "similarity_id": "0c27c87a464242ba6ae0ada50437f591c69d99bfedfa8e54883ad8a867f7d540", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", + "similarity_id": "c7aa5bbd271945c843a80f889225b0c52a537143d7d8f61b8a4061b231a670fc", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "0e6741250342a3e4853e5bb37010d5dcd3549e26acbde99a3c758b83637be06e", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf", + "similarity_id": "69088c805e052e8828b9f8a7c5da05cdefba03279e82e831bc6dcab5d70f89b4", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", + "similarity_id": "707ab051388c646536fcfae6489c6d71ac44d197f4dd52245c1df977d66979cf", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive3}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "27e45e9167f5af6eae42515c25a31c4dc8656fff744ccdb0ff081b8240b84726", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test}}].tags is defined and not null", + "actual_value": "aws_lb[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", + "similarity_id": "f1d23607f865826e68c1891350de06f695e09df1dc6723d7b4161fb7a64b08b1", + "line": 33, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{positive3}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive2.tf", + "similarity_id": "b201960db9397f12bafc7d0e0cfa575ef954cee092768f2675de7cb1b8d4b42a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive2}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "ef4bfdeaf2c14b75184e4f5f0fd9d6606770016aed273b1e58d343750ebd3025", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", + "similarity_id": "261b3a6793d3a0d3357750aecf6f6db454a0e6c2e288d1a01568127a580bc3b1", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf", + "similarity_id": "c71b9036b628c802f4a033cbb3966fea4ae019a4ebc1af45513cc9f6c3f1f92b", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'", + "actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", + "similarity_id": "62212ce9e813a833d31ab11a2af38ce7f2967bed290134bd303d0033f3225d5e", + "line": 23, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "393ba58777cd068ff77d916d1e4ae16a325a482688d20c0ac922ab7e71b07a50", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_usage_plan[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null", + "actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "fe79e338d31195c85c51109d8fdc53894bb1b123d08323c4b9dded4692a4de2f", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "e531765773e296c5618ee9e4b10761c9ee2c7bcf6ddc7247fd6169089cd6bc00", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "2e26557e78f3f7955a5a031b7453454c52c59b0051c3f58b0fb80ca9dfd0fc4e", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "4af43f1b8061d91a858ed8034d17cd8a4d6a9d64ce50ac0eaeb2636b62529c55", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/negative.tf", + "similarity_id": "5afed49fc6a2915a402cc1fdb1b8379cb9f7cbec121e1469fa90c9be54981d5a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "fc5ed0e912505526f8a98a4a4e68c43c2b240982efbc64321f52bec10677cf7a", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", + "similarity_id": "7655a9b5b1a4bbdd4cec9c8ae584d8da55eeda37bf8af9d088051f87f575dbf3", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_ami[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ami[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ami[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/negative1.tf", + "similarity_id": "5e40ab8211a035efe849559bfaae1ee931356659f8325c61b22d53b9899dad16", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example4}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf", + "similarity_id": "a421b7589e0da6b62b605a35efef550989462f21c6a304f198ef7c672b7a084a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "f1cdbe8ea87c5bb5c00fbcd517b60c0d1509e0cff29131b8c5d6476de491cdf2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "eebda7e6c5c73313f77a57d81f80784ba28cdc5357c4e935444c1fdf52a861e3", + "line": 94, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is defined and not null", + "actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "8ef2d5c588f29eec85b7d577c725a35871e2a0fbcfc0db33ba8941a748140e92", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/positive.tf", + "similarity_id": "955e41d5d1d04786e98be69491b267366a92c7b8faa2c94e654f6f9c6e2623fd", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_service[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/negative1.tf", + "similarity_id": "d8a576c8572a4c4064a620647e262bd1ecfa49a1c5f76e4df785b2538013a662", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "43c204b5408fd3fd9c95009d665de20a7acabcacaed371c1b3b10e1c379b8470", + "line": 58, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow-public-outbound-sg2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/positive.tf", + "similarity_id": "f75f94d286cb29ce4f0d1683c20de3a202303b44d10a087c1915c7c18780cccc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "db1121dfe91d7df84a97592162b8a1b346a1c99233038f07dd188e94ff94720f", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", + "similarity_id": "cfca747d5adea55d9b316fa3e9005f25c6b6615183aa964378ee99fc39080d6f", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "d9cc822320dc4d9cd025a48c3823e953f0bf29a2a784c54140bd2805104204af", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{private-subnet2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{private-subnet2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{private-subnet2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "a44b1e99b912fa54138525e2863cb045b554de9bb5fbf4308756215d8fc1e9eb", + "line": 40, + "issue_type": "MissingAttribute", + "search_key": "aws_route_table[{{public-rtb}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route_table[{{public-rtb}}].tags has tags defined other than 'Name'", + "actual_value": "aws_route_table[{{public-rtb}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", + "similarity_id": "0e474fccfb992b7ae8f733abeb47ba2fccb83efe04464b77f33aff2ed270d53d", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_athena_workgroup[{{example_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_athena_workgroup[{{example_2}}].tags is defined and not null", + "actual_value": "aws_athena_workgroup[{{example_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "2f055d8c48923799a78012718c1fb4b21d7a0198e2f748e2b9369dca7c21ea4c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf", + "similarity_id": "fcd76071826d157edb744c53ef16f40ff397cea5b9e283bbb2f86ad2de56b13d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf", + "similarity_id": "491572e75aec5c4e850d6616b246a029bff75d543dd8a81702c4535d02b94570", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{positive3}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf", + "similarity_id": "5beb0a48d845e3d7c6aa0246ea1d1db1bb2183556200c445ef71fc80f66ac600", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{negative2}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf", + "similarity_id": "2ae7c0015e1872e779e77bfc6edb482cebdde59b619b226f7e4868c90c559ca1", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf", + "similarity_id": "90b653eca86352c80beb63c96a9b2c2815b17de563861e7b4dbdb292fcd30103", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "2018e63aa198b6b898b9703f6045024f897e119dc76773e679a86c05671a9220", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive1.tf", + "similarity_id": "507ac4927b22bab5cdbba3395b8d8b107704c83bcab157f8c4ff308f9903e666", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/negative1.tf", + "similarity_id": "cc755e3a6cb0faf3fc6959c7d075ee518ea28ec200bbd7dc78109380336e83df", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/positive.tf", + "similarity_id": "f3954aa3293229e6fcf1407295f8a41a2d56fed3893f7363b27c974a11c95cdf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_guardduty_detector[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_guardduty_detector[{{positive1}}].tags is defined and not null", + "actual_value": "aws_guardduty_detector[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", + "similarity_id": "07fc33d5175008f9223e68b689af7a106718429a840f17a62bf4640057a13fa4", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "b4e386561ea6c671889c98f64a8af5fd76420e78d7c80f4d6eee70e437b45907", + "line": 28, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "73ecb72ab2643b1a920380ff3d9323fe577f9fdf2974681b79dd3a92696d44f7", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "1c75034b7ec8992d154727cfcedadf30efc13ad205721cb03e07928272f5c788", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "ee0fd33604f16f32ac1a4f7b6facc70bffa69fb0efd010590c501334b14182bf", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "27a1ee8de2c849bda4a90fa7c02856b078131b29b083c04516a95c7e3dc66b29", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{pub_ins}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{pub_ins}}].tags is defined and not null", + "actual_value": "aws_instance[{{pub_ins}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "17ad9b83d7b4a3d06b5bb92405ece1ddbc134f5c7e1c1dd7e664391015d09e1e", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "a02625f1cedab8735b617b4585e26dc48465ee5de5ef1a69247de4a67f51206f", + "line": 44, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{subnet22}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{subnet22}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{subnet22}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "d26cf45284e13beba9999c830d57149c916133c65d0aa4ce69af33f933a66828", + "line": 48, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{allow-public-outbound-nacl}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf", + "similarity_id": "dca446c913eeb019748add566e8ddd8b512e99f4cdd83bcf9dd35f7705db22e2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", + "similarity_id": "d14870efa711607f8ac398d279fd5fdc0f489c66711d94e86ae1e246d2a8af7d", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/negative.tf", + "similarity_id": "637cf29e514551b89e42850770fdd6bcd4c8aaeb631c04b9623007335030d4a8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", + "similarity_id": "c52dfb2db823b18e0ddd8aa79bffbdd4c0fa693ea9d318a3696fd2f47f0f482b", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/negative.tf", + "similarity_id": "06c17deb1f5198a68483522d37394e87a461143609fb912e160ba1cc8752d3ee", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_usage_plan[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "d0e0872e1a1f2e2e0cd971571a48297fdeff432a05d917236f5c53aa8bf105c5", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "5475def60eec77d37dcdb225e91c03a15467fe43c1de8f432b51fd2c0edda71c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf", + "similarity_id": "5a54c4d0a1878c45af83a386c2da665d19976bf6d26c2b930b90851c6b483669", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "f518a7a3f94000a826ca0682ebe7ac227f0acdd2fafc5d935324d9fa2513d327", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", + "similarity_id": "76bbd2060aedeb8a192d188b52d0bb29feac2b2f335ecb56c1d8d14a3493913d", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf", + "similarity_id": "c7ce2c14447de28f6411bede0bb33bcb570d23ac01ef3469b0b7219eeb221791", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", + "similarity_id": "94e9567976835acc7a19a63bb0a59609ffd3378cc77a3e813ffc55954f8ec4d5", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{monitoring_positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{monitoring_positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "5077a9e4fe0c1d954d1a0de6ed48fb4a69b72dd55ed24248f69f085db72fbdc1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "99d8946712aaba18a750aa58b88e1c290fa5b96892a9345fab6756a177db4575", + "line": 40, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "309e42594c2490c0f2e677e4186913877ec0cb62ab083e1bcbda253f15d791fc", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{codebuild}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{codebuild}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{codebuild}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf", + "similarity_id": "b74abeb63a77ea3dbbb4b49c05d8d406107ae158830d2b3c0d033737f6bb5d7c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "4e2993ad7cc3e86d8b694bb06b77a6e8d365652665ba4534dfdaad2665f83dd4", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive5}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf", + "similarity_id": "dcca84e6f93c0b993b368dbfb5c6d89563079d538453bb10fd961fd82a342065", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf", + "similarity_id": "23a79dd593bc28c07e6b13e8ee9d14d60066009a448ac0d2fdd66a51247c25b8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", + "similarity_id": "59ddb8e8b17db58e3a4c0392cd11393683079052c07f47fc84f01afbf76006c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{examplebucket}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "d383b5d816b06598541ba870ba46c25fd1b915bc81733a276080f3a2b21e5f2a", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "538330f0d7f2664e1c474b8be8f371e56a7a0abe66ad7e4a8b91f052990f7082", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_codebuild_project[{{project-cloudrail-test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is defined and not null", + "actual_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/negative.tf", + "similarity_id": "7866e25259f9f2d87c3c82d898d68de16c9f7e5aee5a2439fa61308c9ea424a4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{example2}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf", + "similarity_id": "e86228dd472c4210069763481a493272dd4f326567b2f7e0310dd02e3212040b", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "9438b526285b5e564be319fca4c8dfafd2bc13d2a2cf6833fb5be9b036603fe2", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive8}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive8}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive8}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", + "similarity_id": "372baf8662a547260c4b851dfe37f8f5916748a9fa6940912f9e1eb789821406", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf", + "similarity_id": "2b678d04a71c26b117b451a681b05327b9602bc49d84d2c2d82af4512ca73711", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "69114e3ba4c6b49283e1c3d252c56ae7761392eec19671ccf3b6577bb83b7064", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", + "similarity_id": "b7abc5ccfc2a43db34510753654b9df1304500ddf1a11cb9e9202eb0099177f0", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_snapshot[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_snapshot[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_snapshot[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", + "similarity_id": "6134d78f266152ea1eb86efb67dc94da71621e290aff38f58712df8204dd7da6", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_lambda_function[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "c9c2a06bb033614c985547e6879e943fce89fa51eb9c0523621b1125da797668", + "line": 72, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{api_gw_stage}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "68bb4bb573fc3de211bb14131b734538d1e125eba670872f966d371381867f2b", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "0612a31a2e360dfb191d936f809d4eb04f86e85f50b26a995b9858f210074c76", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "3c5dee2890876ac461868702fcb14d5f5b0d6213b068e3936c74b4954e17762d", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf", + "similarity_id": "9b01035e70fcc57a6133dae0e9499e96e9a9b1ec33b240a5477bdd3f24f3da04", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{bar3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{bar3}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{bar3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "0892eccf773c3acc5a32709b9db5d98d9c93c4360d32d9dd61c1bdcd05a3b746", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf", + "similarity_id": "a60f6d0c12cee891cbae8682f124f21f1b5a1de700ca63b26b254ceddfe9c9a3", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", + "similarity_id": "c7c7520fe0078890e9e5e11c5288a889850e75e567d60854cb18bea64aacfb42", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{iam_for_lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf", + "similarity_id": "442b2ab40fb3d888f16940b05684a88397eca0354b7f7d38dccf2cbff1534740", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{default2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{default2}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{default2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", + "similarity_id": "5b8e8815977316ce2976ef335bb0a9025c1f88a0f28384727aee92dcd090fbf6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "e441857edcb5152531498652a102190fc5f772a5fadcf4dc5ab75108814c7ac5", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf", + "similarity_id": "89957dd65a545357d6db77fabbde367580e4faa18ebcd71d7194f1dbbc2686b9", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "64264ccc566144634569809fca8a21adef929e85fbf3586e6ee601d5727ed298", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst2}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "843c4fedd84f384401a5a7ea3cd9cdf9b3b70b30c6d2ce702884519ed722648a", + "line": 52, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/negative.tf", + "similarity_id": "39e23c50089bd41f8ffa563cc85f9c56a1f76e5e01d87d7772181bace60c2f03", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "516773d5d8b5859d991eac0080c80d9b28cdcf5adb681f271586b16c81263ee1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "3d1da7cd15a6d7b02324af4b7e5bacd00a121a147d5f92e83d6547b8cb29709f", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "17cf49b17a1709e5c93a8aec46cd423a7ed21d61d43544514951c46e553fc797", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{priv_ins}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{priv_ins}}].tags is defined and not null", + "actual_value": "aws_instance[{{priv_ins}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "f8237960acefac3f8be0b1d4b940cc3af4efbcf75bc7d9dd9b437446c481b9fa", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf", + "similarity_id": "c66ea2898679be6a8f49c46dbc29b7e758b9dcfbfc3237fb2f0cbf47e64ef2b3", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{test_lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "710b07691e7bde9b1b26e01bbef2664a7e9b4fe7aed2d53bfd39348a17cd33fc", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive1.tf", + "similarity_id": "2bf2b16d318d6e771c4a3b91800534d22a9d43f1fd59afcd17a01c9550003c8c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{user_updates}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf", + "similarity_id": "84ecb2f55ee0ea1f0cc8a53c34da669032d3bb8a297efd6484d64420d080b854", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf", + "similarity_id": "7225318b3652ec2522c66ba50759ca7e57a654f7deba0a46e5bef83c8ee10745", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{example}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "d13f310a8f971dcaa803346fc79f9c4ee3d27eaa11a545b9c578f9ebe3db5fef", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{test22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{test22}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{test22}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", + "similarity_id": "9abd138bb7055e8c908da4c5d1ff1d4a21327b94d04f703bb31e8e4eacb1dcd9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/negative.tf", + "similarity_id": "f93bcf6774c81663b96a5e6a1dc6caa36ccb51599e3349793ade316d6aecdc32", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_ami[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ami[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ami[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/positive.tf", + "similarity_id": "76da5875b2bdb16178726827eff6205fb2d05cdf4f40db8912c2997652388393", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf", + "similarity_id": "a17307324bf9ac6aa530e4121b4c7bb44d4fccf10d74e360686e9f4d70f3f73d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf", + "similarity_id": "3557b9ae2cc97dbf7ad7e542f6b8c901e001dad42923045b520b05ed6b186925", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "95c0025b8f189cd6480b4a252329e796b2af7d4f8237a63245d805c425f965a5", + "line": 19, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive3}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", + "similarity_id": "1d4ba686e2deab685c57ec959739832cf756fc472732de29f0be924f140ffd21", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example2}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "f954d004ed4b77e24cc14306499e91c48f7258cf7afced3448ed6242f11f1869", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf", + "similarity_id": "a46e1d381344a768ea08e407395ca3d15c2d4ba8d90332925693a9fda6579bc8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "0e32c21f3db3c8f6a9c32c3b2cf50587d2f1b4f01af841967d7bcec08e27e81a", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", + "similarity_id": "a0a359e3db745d85069cdd5127bbd40db1a312f1989180a1ddb5321bf90b999e", + "line": 20, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user_two2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user_two2}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user_two2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", + "similarity_id": "43462b733c1e294edfa2b23677ed0c17762a35471b4b5e226f8123a668999e4f", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_object[{{examplebucket_object}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null", + "actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf", + "similarity_id": "b5bb99fb037fbbbf3371564928e76aad57c8d2626a2eea94f484e96a1c30bf51", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive2}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf", + "similarity_id": "19bb6d932ff30ced592cb6f06697c37682a279b58e2409b59072a8cebd4cb079", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test3}}].tags is defined and not null", + "actual_value": "aws_lb[{{test3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf", + "similarity_id": "b94ee7878149d2266eec9affb8a88c4251bc5e26450df4465f576d8062edd957", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/memcached_disabled/test/positive.tf", + "similarity_id": "e256e337c953cfac68de9599eb93d8de58945c0a0f7faaf1fc5285c47a689535", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf", + "similarity_id": "e4386e5b567c7a3fa89c7ed629d9658b5f0a4ae68a907c46ab3a8f147244378d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{bar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{bar}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{bar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "e4428bf562f1cce5dc4e01e1e282564c7b07b36e78cba70eea41dab5698e9b13", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "d673d91073a57aac2beb5318bf56f380631c10ff3c930f679417911aef459c43", + "line": 53, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow-public-outbound-sg}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is defined and not null", + "actual_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "26241351b2fe0221db62a3ebfae01860d644375def6892313a17c1b03fb374b2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/negative.tf", + "similarity_id": "520685b25a49d58b2fb6405ba121ea90c9194ccfb3c9cabdba5d23cfc9805a98", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_cluster[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "6defdd3e776af665deba3b46a33a2bc36385c691733b07991712de30b93503f0", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb_2}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "6727e76468a4c0dbf981ccd97a118f6139cdb31a806880d82106b52316a5495c", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test-ec2-instance}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{test-ec2-instance}}].tags is defined and not null", + "actual_value": "aws_instance[{{test-ec2-instance}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf", + "similarity_id": "3e50a4fe72a239298854ddad5333e4ff841dced5e8e623b57076ca6a5d82ca19", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf", + "similarity_id": "6b66b89fa0a866d81ac52c6ccdd86215dd497e316812e039a415e553ba7993c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{postive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{postive2}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{postive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf", + "similarity_id": "c0ee11714d4663de2877de6f3550c45ff097be53bcc54c636653276b5e3a374e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "1a7ac61dbf2e3f3b73e67b797789a23ba1b3104288c2ccaab217f4f99e03e4af", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{pub_ins2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{pub_ins2}}].tags is defined and not null", + "actual_value": "aws_instance[{{pub_ins2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", + "similarity_id": "30b0cd90d8314294ece920e151fc44baea81d0e4360ef3c7ac1dfa63a9394694", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{positive2}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", + "similarity_id": "1b5f4c5e90ba877785dd878c3271237bc10260a2cadb5e0fcc8920caf186a6bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "4ab3beea6772677122a2dc6c098dd4da96a7f3e0a10c5a42d2c6201c1949e7ea", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{positive2}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/positive.tf", + "similarity_id": "3a23587ce8b3355c1b75300712e31ef250ff8ef9fa5c62a77a5bc6aa4d429db7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_service[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/positive.tf", + "similarity_id": "a2495c663f8d2f895484a0d09e450972cf56e636ca4e77683913c0df8d8c4261", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_node_group[{{positive}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_node_group[{{positive}}].tags is defined and not null", + "actual_value": "aws_eks_node_group[{{positive}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf", + "similarity_id": "bb260f0b6c15e5d4776cf607e75105e0fd7b43bfe410cc6eb644d23d360316cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf", + "similarity_id": "51e2c7ba8238d45ab5f2b4c3516efd33be100d08dadcf4d55dc1b54f48998248", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "28c4400dc5de01434bce2c767b7ca41e50ecf3dee35407c887185daa5794a9ca", + "line": 60, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "11a865b89014aac57427a30218b60da173f9e366819e0e861da91eebae74ef02", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "aa49041cf372a5c4664e67afc090a3146b802941d3ef6d49a641ef42350a5fb8", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "41f16462e622323f76759f988bc2eabacf171e244c0ab683cd1ff2e69ea90700", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", + "similarity_id": "d025d3a978ed9b644c36a889d84315d34d55a641bc17d8b186c6b6a12a64b269", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "41b2a94b87fa2d87b0818351cf71ffdce6b90c043bc2bfd556fe6d6cd49fb25d", + "line": 27, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{positive3}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", + "similarity_id": "ebbb5a684f35de823edb9a0924b75a7bcde81f46c5c026ae88d87a4c7fe25938", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "af2ae2af5eba88d65904d4dd84875de900e6fff29ff549810479c9faf91bebaf", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive4}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf", + "similarity_id": "81f6379f028e75e24409530fcb8f85dcfbc61eb3a83cbd5ca85292ec75ff0087", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_config_config_rule[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_config_rule[{{negative2}}].tags is defined and not null", + "actual_value": "aws_config_config_rule[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf", + "similarity_id": "e9191821fa3672508186a9b2724c4f2479e3db388e50b880f8567c5f2fb2f648", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{iam_for_lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", + "similarity_id": "0fed6d6b7242e47145d9d4e63d3d6705eab40ff144e458a276e7b566bb0a3edf", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf", + "similarity_id": "dc0cf59eb88b8d06885b3911334937bea36e37ae3cf5bd18b26e69fe1ed20a41", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "15bbf4504be572a31d0531d3de384c5a6a4f4e352347323838d18ad7552cfe9e", + "line": 44, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{subnet2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{subnet2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{subnet2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "a8f6b5184f718342a60cbb89593f2cb633f4ca178e84a33ecf3105cd4185386a", + "line": 49, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test2}}].tags is defined and not null", + "actual_value": "aws_lb[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf", + "similarity_id": "b9ffab0e6250113b3c983e2d48110f5e8868d1e1340c9d1e343b915ff6668dfe", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/negative.tf", + "similarity_id": "6ac7704ec9dc2e567ea8eb24c92fb328e58b7cba5f85d703792f709c77662911", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_route53_zone[{{example_com}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route53_zone[{{example_com}}].tags is defined and not null", + "actual_value": "aws_route53_zone[{{example_com}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "191c8c5756444c07dac4872af0c55ea10045ed3ef5afda326a5b8a0827ab1463", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{test}}].tags is defined and not null", + "actual_value": "aws_instance[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "7b07904eafe81902e46a81274b15a93fde5e06d4539a7aaa9754838e8aacabc8", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{example}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/negative.tf", + "similarity_id": "9eb97b557154f9117f1a9458fc0808ce877be637f3794dc3f32a537bc73ea0a7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf", + "similarity_id": "1608cc1980b8f6746dde207b10d79389d26200eea50c2b0151792314f0e92bac", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "b448f7be1851859652f26e7c494ccd5495e7f0e75ec0d306e91d3b0c3bf3f419", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "c5fca03dd66b80605ca1913831f98800d229b5680e34168bf072de14cd9443f2", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "23b677233201e3be436893d2e3788d703bb622cccf9e2c4a752b544927e35079", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "1fe5af4d7384bbb99f39916bdc159b5e765dd94bf59054c2258c815ac5145a13", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf", + "similarity_id": "1ecfa92af60fdd0a6f4bbe4c3b6e85254df9b79406100422745fc375ad2730c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_cluster_snapshot[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_cluster_snapshot[{{positive2}}].tags is defined and not null", + "actual_value": "aws_db_cluster_snapshot[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", + "similarity_id": "f1fcb93e53cae99aec8e2de3f715f280a71a3c7bff8de38124eb59199f69a6c7", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{monitoring_negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{monitoring_negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "cd7415f25e912e728eeda59d54e9a6bffbedae63188e111d80819f36ccab5ba1", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", + "similarity_id": "7be94ba0431f0f6aab830e7785d9a8b6a5e4200f5b9aa24501a769d7748330b6", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user_one2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user_one2}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user_one2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf", + "similarity_id": "18b470e6db26f7cf8a0dbf73cea3eb19d1111914ac6190341cd3546296aec031", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_config_config_rule[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_config_rule[{{positive1}}].tags is defined and not null", + "actual_value": "aws_config_config_rule[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", + "similarity_id": "9401ecc37787bb6dfae15c111e059cdfe165f5fc58d3e7d6e8d08c521b2745fa", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "9d3f19e95afa6ab7e3f58c71e5e88cb53c1c08bc499482d6d435638b7450fd63", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", + "similarity_id": "2549281003f8119ca6b95cc225206b1a798640a044ac51a59161f29716eb22c0", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "e146ebefb44f84dbf3d3e4d8bb06397f0f7a05c8c964206e64a7ad3c6e81954e", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", + "similarity_id": "35115a0fb703be0bfc5ec70b5a9b10c18e9a88a33e78067b3fb8b2ace61a6070", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_snapshot[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_snapshot[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_snapshot[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", + "similarity_id": "bd69fe7069541454d1721579dc422f53dfa161224caba76a2adf721d9b4e059f", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "ce159dc07ff57b6a33db159c5a8daa0513cb9f3db390fc7774e63b78ecfd4b20", + "line": 20, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{foo3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{foo3}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{foo3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", + "similarity_id": "1ca32488ad5b7f94154241dc6cfc3d12119f62b73452427aa30f679edf9062d3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main3}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "f6087a04b217a7028237b8ba68b4c8434e1fa2bbe4a96c7ab4356026e3d8ba5e", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{foo2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{foo2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{foo2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive1.tf", + "similarity_id": "929a5b0931f65c6bcc9947dc5c56b3ae6ed78be2136b941b563bb423a08f15e5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{user_updates}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf", + "similarity_id": "6fb58f137ac1812edfa1233a8be4b168b1606f4a6f6f0516ac8ffa9729c38c8f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf", + "similarity_id": "ad1c51ea993097ab6ccd28884eb7aaf71d62b6e7281d17a7bae2af117092bd2e", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{negative2}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f7370db98303a3141ff18f9c6d511e3064089e89208584f0b98f4ec1c688464f", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative1.tf", + "similarity_id": "6782bb830f9e9a243f7213948c57b8f560ad75badc3ee82d64ee75f0af2392b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "256a52f1799995882084d24f4339d3e925572e6ea5b25a47e74221eff9a258e7", + "line": 62, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{positive5}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf", + "similarity_id": "a801217030d3b0e8e1d56a68e537ab4d3624801e109b07b7481202613e4e339a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "f01dd34ee0ebdb8e46ad77bf6f934da1381e2264ead0b5e0979e48e2a6a757fd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dax_cluster[{{bar_1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dax_cluster[{{bar_1}}].tags is defined and not null", + "actual_value": "aws_dax_cluster[{{bar_1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "4f57ffef3e1c7732aa69af74d1886098764365d22c270e651652c13de4f8ff18", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative2}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/negative.tf", + "similarity_id": "f5a9b32284ce1a13571f82a88ee53934cd1ee53ea4703973725cdcdfc67340f9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "dfdb0c92947bbf5dbad1c647de329556bad685ab30452df4fc6e220bed6077c5", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", + "similarity_id": "3f443c494f9e99835030d4dcb9a7c0f7c33be8251b8bf7a8a2fa6ac891b0313c", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", + "similarity_id": "52ae3f8e3c3451225e115fcd134e9f83385a3670e2a15b43332737193e90584c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf", + "similarity_id": "d5b2b99ce705bd8dcfa7dc7a6d12d75f460a552e1a2249de14597ec8f0ad8951", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf", + "similarity_id": "f3fceac98bb569fa5857a123dbaf945d7f03bb0ee9587f5e8bec5ea9137e43b3", + "line": 41, + "issue_type": "MissingAttribute", + "search_key": "aws_batch_job_definition[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_batch_job_definition[{{negative2}}].tags is defined and not null", + "actual_value": "aws_batch_job_definition[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf", + "similarity_id": "d8a0693cfd4cf7e844b6ba3ad94122c93ee5a7bb122facb4b67210ef47f99ef3", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "074491364f9ad692e9ffb7a0bbb3cd753236fb964ef7a848a120fd8529f31ea5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{test222}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{test222}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{test222}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "7e3a40cb27977449a7ef70d4fc5586a8829c3e57af1f2da1ad44a82805098c7c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf", + "similarity_id": "089fedfc5231f261a14c640a619a2dc70faadba71fc7e862feedac01f4837409", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "db141d0358b8679375cddf94f05ccb8bc0144a995bcc4b7e09ff8e51ac58be82", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive2.tf", + "similarity_id": "8e556c15562a49823de6a25f3eec6d22fb8b68338b52e15b3218c0624791c732", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{test}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf", + "similarity_id": "f5c9e50ebb49a1ffd397ce6c22a6e150390a73204c52399ed624b57e7aa34ec2", + "line": 41, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{negative2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{negative2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/positive.tf", + "similarity_id": "bfffdb27fa9f3e45e177bf16c82a3e88e244f15087f216b61499d8f0e3149fec", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{secure_policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf", + "similarity_id": "ab8eab0cb98609ef178f433a70dc3b485c0cab66c7aff3b5593136712797cc5a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", + "similarity_id": "a896de7a4488ecf4ed2bf7e17c50dbc5cbe80d6cf0ec7e7cceb8baf4e82d225c", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/negative.tf", + "similarity_id": "fe8bbf056f8e1eaeb140ee0a975f35d08de2c5f5d6ea7e8d4065fd6a8a0d0e9f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a3}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf", + "similarity_id": "94dc443d27fbc47d48d7d0f50817d22dd65d178d0b8946fb1a97a274e971ce0e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "9be047f91eece591d1cd2d86edde0f580f939f598cd60078bfcfc0822aedae83", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "53d8c436c5b634d5cb3630cdc4048c9794fa7100230f8e44d70f3ff017774d27", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "2ff28c577eff196a80ab496316ed36febbc4702c0c92c217d914660582f9f12e", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "a0ef527b8f5a4c9da41f6df6680b8a157b2091de30f9a420eafff52c43249ea4", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "1fd37b8860d1f339cb5d0d820ec3260b8c4639fa05b1770300b0ae516a648cf6", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", + "similarity_id": "550dcab908a48e620a069757ad535ddfa85cae49e434b6701b71701618daba62", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/positive.tf", + "similarity_id": "7a54f0b140c53b9242768caeacc140e9b9bd756da99bb1bd236fb73c2cf18837", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", + "similarity_id": "f12c48458e5bc5cb2eecd9ec943e9d8d53dfd65e348e7791677e7566749821c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf", + "similarity_id": "14c46b7016c799a7a79d6b9fd0c32401ee2a4e8f56e52c3ea8fe10e6a5dec483", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{postive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{postive1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{postive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "78dec2f0e074b6cec468b0ff31be7171fcf42fa167f12b6c8fa1a113f8218105", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative4}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", + "similarity_id": "64f9436143b49a3cf72a64a21beca85fb87ee7ac556b100632cccaa9eb50c3d4", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "cc27a71dba8d3b20087863d9f76e10b9581a6f053045764787c56ea8bcb88918", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "70be704f4d515b1af9b96aa53f4b8fe78bd517f408650bc4696e5354843af829", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", + "similarity_id": "a74a6b1dea11536b8957c3d826d47ec0d7893e6abfed5b40199993fb901d025f", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf", + "similarity_id": "f3dfdcfe5c459cbc66bc44e4c52ed68ca4c1d8e010aa1b6c05c441db362d0a1f", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "edf1c643f1e8f2a3e75e53c218e04edd1058309964c1b37046571705c61cd3ea", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "b84eadb69e074ef9f6552414382df8510eccd16a7ca46d078cc86a10894b071c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", + "similarity_id": "851997d62c5d82575badd2bab62ee9cb016e425de931885c861b1c6a38d6cef7", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf", + "similarity_id": "1a646a74d98d1c6836ff2378ae3835e681cb56f8e396b56ff36cb93a5f0c0779", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf", + "similarity_id": "f3d4e6294e9c2c7a0ad0fdf7038a7762db61afb3b3024e79b872941da5d83976", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test33}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test33}}].tags is defined and not null", + "actual_value": "aws_lb[{{test33}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", + "similarity_id": "ce74423a5ebdb6b7fada8003325efb68fa78a83a3d8ef519ad493e4c95fd579e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{examplebucket}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", + "similarity_id": "51066425f3c3795ca8f7efdb30faf8626bcf26a0265fbf4565df041d85ba94ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{postive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{postive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{postive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", + "similarity_id": "3c55eb5b2a80ba26ca8af0a47c1b6f9d4e15ea53a58a245bb1b519f3dbf97bda", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "f32295d4e6444ca1ee2172e3411c8e4e5921b2bdc74204e8b04f92d41b5e24b0", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "327e15f99b01b0ae66997060af16201647261f4a32185c6ac602f9edacd86f15", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf", + "similarity_id": "e823d8a156d0f07f9b6dcd1e7a73cd2a074a80f86f249e8eaf8af68b2d43485e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "13e7a8f2e43cea0687127698852b3b21d39fa1fcb53e20f59a1e0f9934d56c6f", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "4aed886ca8ba5f772742ec213f79274b108c258cea7b8bd769e2fc8c82fb805c", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf", + "similarity_id": "37ea5262ecc508ffbe423bfcf90f00f3aadf676432f1370f499c0fba936ed05b", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_sagemaker_endpoint_configuration[{{negative}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has tags defined other than 'Name'", + "actual_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf", + "similarity_id": "76b5c89a698a4c22bd328d64028cdc5ed46602ae94ac6f0e7ab2e6e3600264f1", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/negative.tf", + "similarity_id": "7e30d1c222fc45220644d624bcd0567c473f44512ef1c4074b946b80304cc291", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_node_group[{{negative}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_node_group[{{negative}}].tags is defined and not null", + "actual_value": "aws_eks_node_group[{{negative}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive2.tf", + "similarity_id": "fd5d638af2b36f88ab03e0f50160b7d6e7186cc2238ede0eead63c9d9b0f3e13", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ssm_document[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ssm_document[{{positive2}}].tags is defined and not null", + "actual_value": "aws_ssm_document[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", + "similarity_id": "02aa15a78e3a1fce9d1bbe9514ff43f4629962a53e8bdb4caf1a719de3339781", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", + "similarity_id": "2d2272715a1892aa4140c5c56a4e67189e557c5d4a4f18904e9e67e70c01bd7e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/negative.tf", + "similarity_id": "450ad3925bf7c7c081215d0b88df9d5f962abebf0206d854197fd7ccc953344e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/negative.tf", + "similarity_id": "947a65993ec3259f766561b26e41910d543a4adf8de4beeb07e974fdac4643d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{example2}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "190c94b0b2b24113def0cf693efef28e6860874ea48660fee11e5f47c3bb316c", + "line": 86, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "e8f71c54fa498ad3a80065100e1ee29c295967824429b5e38b6d3817d2718234", + "line": 34, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{subnet1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{subnet1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{subnet1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf", + "similarity_id": "6fb74ea6de2af993798d4f278ca4adfde850464f08e95a13833e4b5b7c2f9773", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "d9d6421ac4b66f63d0eb549514f4d5f02e2b704cbaa39ad5ae8e11b96a55a11b", + "line": 88, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{test2}}].tags is defined and not null", + "actual_value": "aws_instance[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "940f7acd0bd8010cd1c9fa38593d16ff539c7cfd2b30c61b4e29afd7a49220eb", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive1.tf", + "similarity_id": "a2ff8df06c57aa62a69b0448eb1570586231ff4b1980f4b85f4c0b4307eb2f37", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive1.tf", + "similarity_id": "1e645af2229e581d6ccbfc984e69ec8f13ed33dc79daf3c64493c0a2395d4feb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ssm_document[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ssm_document[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ssm_document[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "44cf75869f027a88fc9cd12be7cb3ec7a053ed68145258479930d13fbc572c53", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_codebuild_project[{{project-cloudrail-test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is defined and not null", + "actual_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf", + "similarity_id": "48ad1912be1a7c206f989c2f90f8c4ad7b04223a6e0f487a15251cf8766e76fa", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{example2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "319c999a711e159ac5e65b7dfa8afa97b7171d0efd4c99b236da88b619dea086", + "line": 106, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive8}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "09ee867262e7e6a5e89c8e705d943586b75f790070f527998e0bf83a38c95b7b", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "369c6be4d1c1c8b9029abbb49f2359ecc35f2f6e88010f835c1b8df39c479f64", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/negative.tf", + "similarity_id": "66b36a3a331b1b1cfea85d6a49b153ead150a9edf8953b149e185bf230d4d1ba", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", + "similarity_id": "75e60bb9574ef6ffd13b5eac22690ce7ba9b0cbf089313475b222389b3ccb701", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/negative1.tf", + "similarity_id": "e7fcfb974dfdeca3762cf255c92bfe7f4216089777c75d4d6b303b72282f0abb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a3}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive2.tf", + "similarity_id": "218c99b72697b5d8dc69c6307d7ab67eaf598f132e22e7ae8e7be97d64836f58", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a2}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", + "similarity_id": "14fb818504232a1707691f2ccf1cafecf6bf1cebaa3ba6bdd68323c0130dd368", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example00}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example00}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example00}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf", + "similarity_id": "ba82a8835b3b1c6ad004f427b8aacc71734a973cfca0d88565cec63c07a45a45", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{postive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{postive3}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{postive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "5e3276a3079883cd1967ac89c3c3fabcf55cf944e266ad28221be632d235aa2b", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{public-bucket}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{public-bucket}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{public-bucket}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf", + "similarity_id": "40882ba50ebe6cef99ee6c065d29d681dee772dc45d8ac93be459702a05d4eb5", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "68cef50e605408b2f4b5ac9bb96a66ffd1db36034b30474b0f3e150d9cd0cc6e", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst12}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst12}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst12}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf", + "similarity_id": "767cce0dd632a163730026194e22ac1640b7f94285a6e393dd4815d6c321af00", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf", + "similarity_id": "85160dc0f396d7491a76ab02c6bced4417775566c67433ec09193dede51b3822", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", + "similarity_id": "2e3eeab7274491a175c816650f5252e268d39b2cd2ae04b8bc4e2933c5764ec7", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf", + "similarity_id": "32312921137a69ceb0994208f54402fd6b6ebdb7774e15c69bfe0720cb0ffd1f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", + "similarity_id": "bb8ea811a4ab7206c36dbeb4b06203af39515761bdd977cf62a9c112d4a4ba37", + "line": 64, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{positive4}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", + "similarity_id": "9a9768e64ec9c88afee2f1ec2a9c8c180387d9ea9ae62a77fe334dfe93440e7e", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{monitoring_positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{monitoring_positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", + "similarity_id": "1eefda542a82f205c5c82860f872d0546b31eea1839edec0ed8b56c8b3769c94", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is defined and not null", + "actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "0bbfc88181ca484edfd2fd2261fa85b4bb1993de0175f265013c85b09732cdad", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "073933d364e8ad6d7bacef5928a61cbe821b5fc435493f294ec3ac91456dbca2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "c89503ebe0fe9c3d97ba1f81eb8610cbc91eb22a66054e45f842780bfbd57cef", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/positive.tf", + "similarity_id": "60b6c30bad6a7da721e12e6e14d84d17677d21f41106a15356129723e1643d42", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf", + "similarity_id": "288e1a9fdbac6555856810a39d0bf1fb46e546bfb848b4e4811feb5c38f97fd4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf", + "similarity_id": "b77f53563a6a880962bfd89299dbc95349eac972f050899cb917e0951668f192", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_sagemaker_endpoint_configuration[{{positive}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has tags defined other than 'Name'", + "actual_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "941026080b380417420912d77b129f561181d9b2e3ee91d569e431cac0d67a66", + "line": 30, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", + "similarity_id": "e47696e665355800fe8b40f351cd52389c910778a15cdcba3c473e090975fe49", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{q}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "484bd967d7f62f8d2066b302f7aab555b2cd361a9a518439ac4e2defff74641a", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf", + "similarity_id": "500b7547ffb7778f44855cb5cf190e7e38866113ed35943a4123b4da6c269a42", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "829e673f5c8332d89c31c1978e66b2d942636a906f1e5cac455803807577adcf", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{test_lambda2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{test_lambda2}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{test_lambda2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf", + "similarity_id": "687905ea8280a48775153b37d3be9033740f7b3e3c5cc7152c56a6b05b33b40f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/negative.tf", + "similarity_id": "df97fdb5bc3354afea3801215dad5085d9eb4cb30814860d9a8e17dfd3516bf2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{test}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", + "similarity_id": "64d5c93496ff0fc2b53d638f479cc0a6c7928e8d21afdeda76ad3e520e0b79ef", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/negative.tf", + "similarity_id": "b9940003156e61ad5af63d9f063bb4ebcba6b3d2db8ae8946a84b8cd1807f092", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf", + "similarity_id": "0954f8c38e1399b5164268b9378ead9df9efb931a38966685b3ceb453ceb8cb0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "58006aa5953a62be80285d965954cc1ddc588d9db124fe35d0255929101dbab2", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/negative.tf", + "similarity_id": "eb93bbb35d65945543c9ddf7517140502fa2273da99719e4e3c99e42deb9b7bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_service[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/positive.tf", + "similarity_id": "1552e46b1c05e6c811a3b182b1e7e3c57940af23bd9e4aae7829c1b467ed5c70", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/positive1.tf", + "similarity_id": "eac23ef05dc1b31c79e841fd89771455c6e9ca54d78f76ad4e5cdf7701ca25b4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf", + "similarity_id": "76abc79cf8a5c8b582da62599653ceb331395c7c901a503698db1801ae4c3344", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive8}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "3b19eeb18c5870604f4a1c5877bed3d2875fa8d36c291da1edd6d66c3dffafef", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf", + "similarity_id": "e7d25e8eeb6d8ec494e7b4ac1c04c0f0669db04237eaefbd800eb957df74b539", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "6da67a3b662c358b5e57f30b725257ef9d3d4138c8bb2cb39bd90c67b7dba7d1", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "24ff225d1c5b993e14cbb4596d8fd51f91d0b8f6032a9ce5be778cb884990ff6", + "line": 42, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{positive3}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive1.tf", + "similarity_id": "426e3a813d3ffcd446db3239b2d3038a4f2c6f461d4bb26bddb8223da7b48b48", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", + "similarity_id": "df39e50db13cba60d95fe31f5eab483202659abd08461215f8c74bedbab1c13f", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{negative2}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", + "similarity_id": "20b95cb272833a8a109c5bb61bb9615185b925cecea16b8af4088353029925be", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf", + "similarity_id": "2fe8152d51efcca906e01bfaae31e6ec135c595ed8e683a493d9c984b526bbc6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "2da471f3f0000cf5f7e0f835c30d186ccced1c2abc67f0172005011b911c202c", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{cloud_watch_logs_role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", + "similarity_id": "794209cbf85465e34efcfbccca6713bd3186deb2e920ae6eb7978a7eb63e5e3b", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo3}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", + "similarity_id": "6beb1129fcf99437ee86c63bc30cc6e165bd4caa5519a5b84d2c3506591b4231", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/negative1.tf", + "similarity_id": "1ffb0212fafe640ee6fe652f72ba6a0db50d92b743b6fc3a41db0bf907f1c218", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_athena_workgroup[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null", + "actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "024b277b161a021d1ab8f88a3a357598489e37b1a6f2d41310ee737894d0bd7d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf", + "similarity_id": "360b22fab444d5ce9f344a0c2307a7ee7b1e64e5eb98137fb12e661ea4037684", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_has_expired/test/positive.tf", + "similarity_id": "dfb387d971fc64e3777466c11ecbd69f79ab5bfafd360e31184d35a99a13a823", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "0de03be8af24c0dcfede23eb7e42765a8063bc04acdfc29aadd8c2ea070fd0d1", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_dax_cluster[{{bar_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dax_cluster[{{bar_2}}].tags is defined and not null", + "actual_value": "aws_dax_cluster[{{bar_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf", + "similarity_id": "f5aaad4dd6c2ca25d65175f8a3efc6b4ed225fdb1d8d507ad27c01b5ef2ae708", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{all_features_allowed}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{all_features_allowed}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{all_features_allowed}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf", + "similarity_id": "b1cac7f2deae0e332762d6bfa090ff8439dfb132113cd5ccb48e67eaa0674f2d", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{es-not-secure-policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", + "similarity_id": "edaf2a8443111522214d44e2aab150717a989f64c0f3af02bd3e0b2d5d89c274", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", + "similarity_id": "8da9369ce85355a8b706969db784e00e8518b6b0279c80e4dcfd5cf89a5abd97", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf", + "similarity_id": "ff2e59a4f5847a96e125ccb9dd7e695cf0aa1ed9668e7922edf320efb9c18b53", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{negative2}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "1d07c4736e5ffe5e83f6cc8c8d9b96b3cadf2b88524d6fcef720e6736b4f1ae0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf", + "similarity_id": "8b598fca21f90eab1c38ea28e78402bd29c1d77d60ce990152fb163fc5dfca5b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive7}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf", + "similarity_id": "34b5b7eea0d1690bd684b0140bd95f02a6bed19b62d55d81c164724579734239", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_batch_job_definition[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_batch_job_definition[{{negative1}}].tags is defined and not null", + "actual_value": "aws_batch_job_definition[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "4ad915e306da616399af5c92a17a38d7ad7009704f672e619000aa24abb00cce", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive9}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive9}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive9}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "d961bd5b5e4844adf4488400a9dfa78200d42a324d5d415a30e3f6cacf696521", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "1c81e014d1dba3dbe8f95cc647a6abddd3205d7892fea3e05258283f2354ae57", + "line": 72, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile2}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/positive.tf", + "similarity_id": "0af559c0122892553f90855f00c2dc2669f195fd97f9b573f4f703f5afe65452", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/negative.tf", + "similarity_id": "38e3965e93bc0ebb8ab6db47d0c59b857458c46eb00a8989411bdd95512ca7a8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/negative.tf", + "similarity_id": "bc197c47743fa87497d3de82891388000a4fb5968946bd9f553aab9abcd4ddce", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{q}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf", + "similarity_id": "d497fe33ae44fb7021c9c883a0aaf0613e3411afa4fa3433e10a1ff2a4081147", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "8e7be03f53c62ffaae7813f12a0c06ccb29755838f44d36f8585269d40a6f369", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf", + "similarity_id": "f711138300784437dc5f7c823ceba28c141779c8c58fe3a201099e6b11b895ab", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/negative.tf", + "similarity_id": "5167dc07bf8f7fb6e49408cc60a1b16119c4125be4afc310802e4dc72b635730", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/positive1.tf", + "similarity_id": "830435bb3a6cec187deb229545c04668edc00b7b52a4501d979bed68411f9fcb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive2.tf", + "similarity_id": "08ecd82604c837198214db3d23dd03776424433f730b26c8531abe08e083d36d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_server_certificate[{{test_cert2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_server_certificate[{{test_cert2}}].tags is defined and not null", + "actual_value": "aws_iam_server_certificate[{{test_cert2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "29a669983f734fac7e9fb8630bd673060936c2421a1925ba61d202c1848f762c", + "line": 76, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "d2e5c09aa3f99b431a4394cc403c12465d9d6a8f1e4a28a226977ed84a3b48f3", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "e9b3bb858a83b6d24edc03184e003f9e44d0890f86e14bbc2c80d11129382560", + "line": 69, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", + "similarity_id": "e9ce565c69fbda08c58433b8f7c1e2f9b7aae9ade07bd0ab3df1caeb2ac2d590", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/positive.tf", + "similarity_id": "5d44077d925c17af7698395a5cffd4beb5e710963ac785dba18f0c29eba1ed9b", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{lb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{lb}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{lb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf", + "similarity_id": "65d0652aeba60add05c49c1836f10460412d48fb0fbbd8f48669015935dde10a", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{default}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{default}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{default}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "04312fe7b2d21d6262efea71e6fecf482e5e95d1af61f5adb6cb92e87bcfc48f", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", + "similarity_id": "f54d8a536aa7ccf58605e825a61eb744b74e53b1fb90689570299f803a85b4e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf", + "similarity_id": "911d257c2a1854408c40ab0a879d522b5ba258faffe9a92caa95f5e02794b307", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive3.tf", + "similarity_id": "6f75dad11972a091197752a1614c603d3b9a25a0447ecafcf3ffe32e2ecc45d6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive3}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", + "similarity_id": "131afae0005f9daec5d98c96ab5b741ef6cad8da9fdc8ac80c6b46b07536b778", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "efd58a6c5ba604f8a387bf22bb7efffc84ff34ef00393e62d8156048fdada7b6", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "badf30c5be23c8df8bb35d193a1b8ff8ededa67916b2f5ff808be09eae34a459", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "737bf3609d45ae5511492b7ce02f35b9036696032a452266d0f111967613ad95", + "line": 24, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf", + "similarity_id": "c7978d6fedf8fa7d86f5162e4d2ea81b653fe62542b97ba75160afd5a1a4d49e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{negative1}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", + "similarity_id": "d311972bbcc9a536b29f16ef805c908cc3e391652f3ef1a68cde012db2e2475c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/positive1.tf", + "similarity_id": "3eaec0622f056cce42179f558af3e321578d403acf3a413db1f8e7102daf412d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{postgresql}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf", + "similarity_id": "e1d94934cc89878e082e1ecfecbbad0151f98890374adc2efba1ccdbc49ca4a6", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "4f591321f29717ab20238b97e1f78e4e469f9cd0eead4e86e0a75c61dacad232", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "fe0f89f652c7cbd6ddef463af3a44fa497771f7d997334eae281e0fffe5498d6", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf", + "similarity_id": "1dc960204a220423bb6e50a55d56d308c6ef87099f4742719851509ff87704c4", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf", + "similarity_id": "1f986e6289426c21229cef00384479093e6af8c3e70497f1692d6eed4d4cf9d3", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user_one}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user_one}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user_one}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "938febd5c740791bec6131780a344b1963a0202f8896f43edf896cc6084892ee", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "da3ea37f2c4b6ad1490d9391fb9bb72660f55fc54fdd19ea994769f868fe6aad", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{test_policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{test_policy}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{test_policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "6b87bd5cc26e20ba7e65658041ab8520d47c6e28e7b027c9ac75831a252ca41d", + "line": 76, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "7cc7e5f4ee9f8797a0fa83c818a3bd9561b54ceaf9abba2aef810e21cdfae483", + "line": 56, + "issue_type": "MissingAttribute", + "search_key": "aws_lb_target_group[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb_target_group[{{test}}].tags is defined and not null", + "actual_value": "aws_lb_target_group[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "10b45e9e1c8e13ea719d055373f17142b5647e5dbc133a53f1d6342a4ee665e8", + "line": 30, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is defined and not null", + "actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "49e946826e6f62abd4671001251649aea7582e47fd5e8e89fea93b51f0214344", + "line": 34, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{subnet12}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{subnet12}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{subnet12}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf", + "similarity_id": "30ebc9cfe821c29299307b1681442b594380f300b92499b61d1efb5e7cc57c22", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf", + "similarity_id": "55232098e347cf4d09ff1265ad24d2ec357926285bdf8108950604309233afcb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive1.tf", + "similarity_id": "37eda2d6d82cd29db279b251e529171cef14adfe8cfc0a157feb970983524a62", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "315a543709fcd468a6166d109fc8bde2aba48a1fa0624b7c69e3654bebe3c649", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive1.tf", + "similarity_id": "b73954a6100888886150b6cc3c2590d2f1f002528c6215212046131683bd4196", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", + "similarity_id": "946fea4bd27d1d8f3cc8bd68a34c71edbb9eb1525730e64c67bde19b9171ce53", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf", + "similarity_id": "7363b637ffd75998a8dcec86cbda05f30e0d78f9d19603c42d3de1d194249e36", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "d328425ea162f5ba17d8409d650a3e3f4e120963272b8f28af36b1b8d031b6b9", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf", + "similarity_id": "f200d7876928cae8f5e4eab919d77a928cf3b076dd855ebdd59bc6d327927d98", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "d30db3e7e5157e5e1ec674073be6de016b8cf56f835c471aa1b54692060f66d5", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_internet_gateway[{{igw}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_internet_gateway[{{igw}}].tags is defined and not null", + "actual_value": "aws_internet_gateway[{{igw}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", + "similarity_id": "af477de158b795b7f2fb383111d041022c195420495399385dd5232dcf838f1d", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{example_2}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{example_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf", + "similarity_id": "b42965f41e8276ea50c3f9e8cb3113ec705c0160cc9e611f5851df98806fddcb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "8514bc27efb710c8f777d267aeeac35a2b850b65dfd4f27fd54cc295dc547eac", + "line": 56, + "issue_type": "MissingAttribute", + "search_key": "aws_lb_target_group[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb_target_group[{{test2}}].tags is defined and not null", + "actual_value": "aws_lb_target_group[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "44cafc7a4ce5812940902c3bb801c30b4bfb86bb6c83648f8580e4ac1d5a9d06", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf", + "similarity_id": "861259c88ab87d1e97be8d6609e6de302001940618e4f2c266a939b648099141", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{positive4}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", + "similarity_id": "4c5f220b8db7539f7fca93f337eeb51b9b1b1f8157952bb5b130a87a6de1be42", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf", + "similarity_id": "fed199249c11dfa3c87814b8ea3731d122ca9a93eef49e8a3615f7d8f6c21303", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", + "similarity_id": "575a877c3c41a2b890775d30bc509c1d00278ab3509ba7b210ec5b0e77286cb7", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf", + "similarity_id": "7075baa6293ecaa00e4d8e9ee94c0120058c6fe8b83859929be25f8396634528", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive3}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", + "similarity_id": "b01484f07af857ead34f6373d174104e0082153644164e858b2f58784af8a9b7", + "line": 24, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "d3805150a049b0d187cf192a75f80aa7b6a1ccb154c616194c9365a53bb52feb", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf", + "similarity_id": "62ee282556d5792c87b241ded26ef2ce69f553bd45b9753464f33e46df623f5b", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{positive2}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", + "similarity_id": "4949e7cfcad54198417fd3981a16044b7d399ed25884d49569ed9a1c4394cb29", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", + "similarity_id": "23167c354cf704c54617b66a313bc67f36962177e03e24ac31fe7fd05482e071", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "e4e767b2000c6183ccb9a036048e783fd71f48ea094c18c5886808cbce865db4", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive6}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive6}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive6}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "b57e9977e1745174e6249dde1c5311f1adb4912a469ba63aa25828ea343cf74a", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf", + "similarity_id": "911aa7f5bcac0ed1c8c5e258939f04c784054cc5b0a70bb68494ce46dd794e43", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_route53_zone[{{log_group_mismatch}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route53_zone[{{log_group_mismatch}}].tags is defined and not null", + "actual_value": "aws_route53_zone[{{log_group_mismatch}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/negative1.tf", + "similarity_id": "64f804060c4cddfcf454cb25522fd8fb7ac19723211ceea061711ae2df4f99a7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", + "similarity_id": "c42891cee565577e3c5bb338c11d652914894a039b9b4f7308a2b159a3d1595b", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", + "similarity_id": "f402c940fcb657fe183e95aff4936e6798329dfab1133fda5d3a36ec449dc32b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "d35f2ba315f1450faf1f860e38d516d87753f8e0b76e99562275ebe54a598cb1", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/negative.tf", + "similarity_id": "e8542ce93bd9d316e2f1f375d89b4b898c180a87abc2e61934a64271cccb51b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/negative.tf", + "similarity_id": "c745a2628de1bd44e2d2d2fc5dc41369683b81c64dc172878cb421b63c14205f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", + "similarity_id": "31d155f2c7aa1f689187f8440758f2bb216d72da71f70b923e790a14bc8dd5f6", + "line": 41, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{postive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{postive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{postive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "a0b383612bdc292ed1d31680c997a3529f07a63adb4985178ddc02fe5a01e732", + "line": 76, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/negative.tf", + "similarity_id": "d9df150b24779b16c197ce62e3007c939b807130482708c83dc6d2e49ded5db6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "f4beb44c2ac02e1800e292c8be6a03a42576cc66ac6085230afc63353ec5a1fa", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", + "similarity_id": "9a29a7695a6996ae6869c34f556bce5896f74ef65d4471ba1c53471b8765786a", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/positive.tf", + "similarity_id": "44f6bccaaea1d6642e9e34e7d2c599fbac824e768d6acfa1e3f9ce1f2e14ca13", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{not_secure_policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "ef721ba48c4988277b4b6ed7d2fffb7b06ec5994f5722d027322611b9616774a", + "line": 91, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive7}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", + "similarity_id": "aece977fc4e0c4f038b764fcab94b8dc5c16bca7e961062c2d33b64ea9ba1ca5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf", + "similarity_id": "04cf4e8ce615ab352bb9ea9eeafca8eb1691184cb91fb2bf478f2a76e0379d38", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", + "similarity_id": "12d8964e2f6c3e65150439272cacfebd9ff18f1181da7a52a1ac25a05aa33bbb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative1.tf", + "similarity_id": "355289dbb5db97f13bc02e2d4627c4eacbb66d53ba3d6c5cba8bbffdfcb194b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative1.tf", + "similarity_id": "db3812848ec337cf9f78b3b60ead7016b2110cd982168b98a3ddec8faa14ea55", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "b0546040c33ab273676aacd6500cd5253a60495deaddf9aff15af3b3d6c56b10", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "e9646fa15d593eed7a0d0a393b74ba6921c33ee1b7c86eef61b3912d15c1a53a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "27ca396eaeabee9269bdeb7e2c05b67c981457d615374899d56fe5ff6e23b61c", + "line": 51, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{test_role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf", + "similarity_id": "54674de9e98cafbba34b292128a2d78f070c2d1e96e1ba945f16d3d441599732", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{example3}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", + "similarity_id": "11e938d695ed577f9229ef5a765698fb14ec5b0d76584b31f9d0b6f51627d916", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", + "similarity_id": "ee11fab17604538603125981a3fcd874e325047fd6f0f0b1fdb6353f6992efe5", + "line": 28, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{q_aws_array}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{q_aws_array}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{q_aws_array}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "68dd1ffa0d5c13b75e0a4a715b10c78e3c41bc5433d854bdcb88e93a94002425", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "f6a012672b69527fd3b269c7e06a32e5ca47655f9de04a4ab673ad51226769d5", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{lambda-role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{lambda-role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{lambda-role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "bf54447c7468376cfa4514ac82e9d83285981508caa3efc07700c2d75ccfda7c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "00b1abf495c2f3751082be775eb791baa7ca79eda7477f82fd829d10b106da9f", + "line": 106, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive8}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "de8063d843362cb4cb736ef0ea226e5ffc232369629c20127fa50dbe04e5e73e", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "49a6a35d70985a8fe28c25517a29523eb8142480dc9ee6fcd660f8f63bc71375", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/positive.tf", + "similarity_id": "87f7326890fef77ad4fc5dc79c0843de9dbc2866986c4c3ded61d7a8a6e98a97", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster_instance[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster_instance[{{example}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster_instance[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "a481971bf91659a20d2dc88a962b66e19c9588274096253db0bb9f61ada5d937", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/negative.tf", + "similarity_id": "362d22d6bcf8d2eda166d145891819ecd8226dd01aff79db2a95fb1ca7b62031", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "a72dbd082eb5ff41a6e267233afaabe531dc75157251c049919cb2fbdf8d0cf9", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf", + "similarity_id": "1a51b789e457a906da665bd95de7ac24e48da9dc440ee393e2431a5feb797dd3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf", + "similarity_id": "f0c9a0ebd2a39e2db1eefa68ca65b2a147d95a29970e0df7c902fa4be2aeea22", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf", + "similarity_id": "60993c1b4eadb9f38ebcb44ae858212de2ed4141c972f5406dbc5319ae954941", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf", + "similarity_id": "8436377b3c283b1ff432dd0c4b9304a040ffca7df54123d7eb7672cc3c69d563", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{example}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", + "similarity_id": "9df8edee04574e02cad57184eca2bc66c168cee6c636db4af33607f406f297c2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{positive1}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/negative.tf", + "similarity_id": "add4bcc38064f706367376cad320dcc1d2e045aac18b8cbbefa2217fe254e00a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "0ee636437b6c7a52bb125dc9a212535084efd14c21858d807a7b6bb552175b4b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf", + "similarity_id": "1480987850b106de2e3229287bab921c86cc9807c7e4337d6b4095af70195edd", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{negative1}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "d842c78be33ffec57a9d1d44740c2213e27fa4ea1db4af9d93432d67884fc06b", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", + "similarity_id": "c0954749a3431925300c4fb106d2529af49c9551e66aba172fd53c4027827b2c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "0d40f0a1db07d4055d196c96760cc845945c884404dd86172ac69398b3dccf46", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf", + "similarity_id": "058ee0fc9ebc6f3ca04f5b76328f4dca47a2cf69f74b08089b27623bb56e29eb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_cluster[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/negative1.tf", + "similarity_id": "23e6292ef9b1a36f93e2098ca9914c07bb43a7f7abe913163a0e0d35e40e8efd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{service}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", + "similarity_id": "c5b0d4f93b74205883e45966ec9af2e820711ab2510ee5ff7d15a9d547262c5b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", + "similarity_id": "bf6dd48cf6d1203cb7c72d21eccdc499882264dab222b8d73bf210f935f645e2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_acm_certificate[{{cert}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_acm_certificate[{{cert}}].tags is defined and not null", + "actual_value": "aws_acm_certificate[{{cert}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", + "similarity_id": "38cb6982d7461cd71fafc837785e37cbbbaa74698a67bcfc28cb6a2729a809ca", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "9d0414dcc59e22da3ead9aded256183b52397a20ac2ac572de66a334d3884940", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst3}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "dd0bebc9a146da82a4bb62e589ad4c6c43dd3da8362a2456ddcde3867f928b91", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "2f82b0cd9f8770c98ce312929455de6f2265c3edf8c7674741f1794f13cfc68f", + "line": 71, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile5}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf", + "similarity_id": "9de1651fa54629a08b3048245e5c99a2f01c87d15b203e09f28e61e60efcfcfd", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", + "similarity_id": "1d28706ea412ac062081e2eb4f9237e6febd748f8ac0a5305ca4bc23520ad075", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "2d88d97c2ba586f2c7f9bac47cefbcc4eac8e7f8c861d5c2721c925ee4d73b3a", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf", + "similarity_id": "6a98d6eb981ad760fc362d285322b751d3795e56f3431d5bb7d07b88690ca782", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf", + "similarity_id": "2f8f4e55043aeaf8060cde74f24b07e07ab27b147d56f943e87f228bfcf3f6a2", + "line": 40, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "f4ff64572cf8624c6a73e062d084aaf7063ff966a47acf2f2b6d04c70a879520", + "line": 90, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive1.tf", + "similarity_id": "380f8a5a1bd203426cfd58e775b01fa99714e9641bb19406c683cd1f2651f499", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{test2}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "b61f222dd03a344da25ac882c4f8d6275425b042a0e8b25a4270c89b3c059291", + "line": 63, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{dsg}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{dsg}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{dsg}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/positive.tf", + "similarity_id": "6492e3bb40272db9ca02a049c91aa7c38784d0c9715890780d433eb4891ae742", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "d194cf00dc68d1ad5b3ab4a338276adbff98456c011d8ec51e1b5c8818888994", + "line": 66, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile1}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf", + "similarity_id": "7a5d0d4a8aa566b266147380f833bb6538e6e758807642419c9fb0b588d0677e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "da98fa80bfdbbbd1439b4f1890d90eaa34f0b83426380542afa2450bea4d04be", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_dax_cluster[{{bar_3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dax_cluster[{{bar_3}}].tags is defined and not null", + "actual_value": "aws_dax_cluster[{{bar_3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "59800085fef26e10d75221d6441c4b5dc695c15981aadc63a69c3bf558ec9764", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{iam_for_lambda2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{iam_for_lambda2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{iam_for_lambda2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "64f3ae5cb1ae3833c96ea65e885e8275d09759239b25929cef39e04851bb1e31", + "line": 45, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{test_lambda3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{test_lambda3}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{test_lambda3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf", + "similarity_id": "77ddb67294ee6322fd636ef53f280e7b499721455a3376bd47ac7d337d03a1db", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_vpc[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "3cc0b7ea613935c4f4d7bdc54430e220928a285a7e077282f73322135a710761", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{codebuild2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{codebuild2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{codebuild2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive2.tf", + "similarity_id": "23f06ba7f2632a0e968726458bec36539432a3def4ad540f876613001d339117", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{positive3}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "67af587d429a510c8bbb24eea60c161a77fe115288afd2d57e759bf676736e68", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is defined and not null", + "actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", + "similarity_id": "42ecc118e2a125e40ff4e8e994daabaff1fba3d096dfb85dd1ad74fec3bfe567", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example1}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "e6cb93ea861b3f03f0ce6dcde8739a86a5174cebdc713e3b0a658b66bbad9a3a", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", + "similarity_id": "7894314f1bb6c353c55e9df5b1a482fc4cd1d033a9b09227aff2f3536a08afab", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_ami[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ami[{{positive3}}].tags is defined and not null", + "actual_value": "aws_ami[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf", + "similarity_id": "33e2a1632801f87e790fdc9bfa89ccca2900eac657449781e906de237ab6f3b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf", + "similarity_id": "c0f28dfdee8b6f17b11c0f1c23f56965ec53701851c9d9332dc6513d959826a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", + "similarity_id": "f658bc37686769dab71201ca47ae2e4e8ae221c6bcf7b9abfe5a6e0fb9b15dd5", + "line": 64, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", + "similarity_id": "5585cab123f52514fa535f5ff99a46b0dc91d09244ba0e4c18e00fbcb8e154af", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/negative1.tf", + "similarity_id": "fa9118747c5aad19e45ef1bd8a9304d6a27bf6657f6bf64a7fa9ef7068aec348", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", + "similarity_id": "00f9de83cedf8974239af44f1cb7d314ac6fc2a828fb08766db0cd2f8868091a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{b}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/negative.tf", + "similarity_id": "ef59ce8cc6ee3d93e05acfef697f5e9b58bd268956fd9b896c18d9929219469a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ssm_document[{{negative}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ssm_document[{{negative}}].tags is defined and not null", + "actual_value": "aws_ssm_document[{{negative}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", + "similarity_id": "ac4f9cbe5003cebb1c4d0f8dfc1ac309628bd3a4ae8ba3dd6df32aff24101e68", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_athena_workgroup[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null", + "actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf", + "similarity_id": "9cbb69e3c91b531151b51aafa32f4e6d1a38281fd118942b15e5de232f8721b5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_config_config_rule[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_config_rule[{{negative1}}].tags is defined and not null", + "actual_value": "aws_config_config_rule[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", + "similarity_id": "33e698690ec58b289134ba3553d2ac94fb844ee0b6afe9bf71432c7decdf8387", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/negative.tf", + "similarity_id": "43d347b5382dcf0d85e858455aa63fe4424e7f4841836f902d4046c7cab98c26", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster_instance[{{negative}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster_instance[{{negative}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster_instance[{{negative}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "b67fa0956e0a1b91b3556b92447b6827b0416845ecbc0986dc4aa8db61a994f4", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", + "similarity_id": "255e174a91bb6ca25dd86895b44ed007d99beb1dd54e6bc05ba27a551d79c518", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{test_lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", + "similarity_id": "691377719393a88c71a5b95170e86d3506e97e1c55df278b27ec7c86009a970d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", + "similarity_id": "17d4cd0e8489ef9b016415046fb0ec40cfc95bf0475ad8f375471d708876eb26", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", + "similarity_id": "3c3ad490b88fae3262e297e43719cbd06120af70d8f10b9cee814460ad19ca31", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_ami[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ami[{{positive2}}].tags is defined and not null", + "actual_value": "aws_ami[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", + "similarity_id": "371b69531b7eb0c269275c8e8b3d328819f4b29c500218b5e364c5d666a371f7", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{q_aws}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{q_aws}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{q_aws}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "4d38df0194d335ff891c61f9d82c4f162bc3d082b4a6fd8d186dced344319d3a", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf", + "similarity_id": "4ba7fe12c1407e79b10aa5914db2179c929a550ad20a53318619087248f65b0d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", + "similarity_id": "cad43037f560ca1924a9c90fa5d19f096c7b2240f384f2f300c1e331bea48856", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", + "similarity_id": "4fe751a15cd90a307f4f6b54c54356c079c470ef834d00624aa785c077e10207", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_object[{{examplebucket_object}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null", + "actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "1460d114b75bd15da8a53d2d505b3f03457384f0e9c708e245cfd901b6c924fc", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "369d9fcf12363afcc763cb869aef150ea81305afacba1bf0d57ebe6d579266d0", + "line": 72, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "762152dbf211afdd3def573e8bba9100d4e3fc85da1c215b4d82b3b5d1c52da7", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf", + "similarity_id": "1694af784b2890619c1a2eba5372620db623c4cbe48009e387a2213ac917b079", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "03df93e9bf127e7171c34ea92c3c888b9d94556338dacda1c70d7f972c3119e0", + "line": 23, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "1ee0cd3359c1b7fa224c745b9b5c1b6d8fd25d59063856454507d1811e5e8c3c", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "6062554f7080cbfcb7e82cef9c8642ef5104d47741b4408fb95e956b8eacd469", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", + "similarity_id": "38b0b47595475cf25ca2db234daad913a20519ca1c635b0f745ab2fa5fd40aec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "499e429ee05b925d74808ddd398ca9bc7e6a06c24a5a90647d070109b6a5afd4", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf", + "similarity_id": "075d2bb6cc4d08eef2a2f4b7097ff4a10cafd07668d7f13148db28d5091e9ae4", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "163971bbbf493fb1a8331582d92b6ff7df7ca1ca5327beadca306896f13456c5", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "717cf4963f674d5c5918c44a95ef3c795185fdb51be4b3451896771466139b7d", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "99b8718f26ec19b0ce1fc68ffd16ce990012a310d605be88c8c1051955c44b99", + "line": 53, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/positive1.tf", + "similarity_id": "08bd08456d7924d025233ee6186fb710c1b76e7388a50cfe956c6e3bca439209", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{example}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "2ededcdd11b3dd8ec11aebdc31663326426fc56c18c38553f05501bb17ad3b06", + "line": 19, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "dc709bf7a1d3eedc7802ff6b49d5b31f4848bbd9f2ed58dd35a9754558d39d0b", + "line": 67, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf", + "similarity_id": "186ddbbfae216891ef19ec19b9ecefc39476131d70773ed307d2bae0d0b2d24e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", + "similarity_id": "3ab2487e28261dab79c7df0c5c958fda5a5ee28b2c2b3b14a5689b84aa3fec0b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "e8ec4e91b1a690bb82c7954c5db336f9ca782d5975333aef74aa1aea32ad01e1", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "df7be6940efbd99be9e931c7e6f362224ad4224e7b92a2f30fbc02fbfb1f96e3", + "line": 80, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", + "similarity_id": "a10c0c7ad96cbff1a8bee0d121de0f3f1af4652fc4a89713bd25e43809c22e1e", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", + "similarity_id": "1dee35cdb166279d17470fe403e40b307d91b327bbab9115310519e2ccdd70d4", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{disabled_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null", + "actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/positive.tf", + "similarity_id": "9c41bc969168420830ea834f42edd8fb090cdb6051a1a5422afdaa6b1d8ad31b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "ddc6e3c020474937782826aa002f6abb1c6c9a66d53f2da52984fe7de23e7fff", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", + "similarity_id": "7bfe3fdde1154909c1f033c9fddbfb9c9d0a05c757bd4cd96e71d2597427a3cf", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{positive3}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/negative.tf", + "similarity_id": "f9acbe3d5ff37a69e3591d00b1b982e0bad2d0de4879b5446b9c814f45056c9d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf", + "similarity_id": "eb7a8280f79beefa08c97eb27424284ab2f0c061fcdd80c0aaa46f043b767afa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/negative1.tf", + "similarity_id": "18f5fc4617f9f02db4aafc68209bcc43ca273c2bfc420c06390d2466da153a93", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{example}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "c5796037a6c6dd9ec62bcdd14fba70fc86d894e93e629744946ec98670b794fc", + "line": 51, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{test_role2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{test_role2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{test_role2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive1.tf", + "similarity_id": "b76bb63d0fe87769f0f5760dbc963d9973c0eff03cb994d0bac2a1c85acf24cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf", + "similarity_id": "d861b8319f64b5b27a0b5ef8e6b6425fb817e2fa24de1966a9b6e98d84fbb346", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive1.tf", + "similarity_id": "4d4f54f186e3f133bbfc776833587aa21ad50621e7eae5c21306706590f42c7f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "702f509ae841055208e001af8fa7ca8b3016725173987c0a0d9ef07d1967f655", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "a244d588c8457e9d17aff7ab0881e78cd7e7ee24b86303fefc3b275289c7ca73", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "5039c269aed724abfad32d1c29291cfef836fcd835dca2a8f2f21253d428d26d", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", + "similarity_id": "0f320bbb08a464ad3bb201576c6ab8fe0ab7515b5538f0365d3d47d19b4a4f5a", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", + "similarity_id": "53ba19713edd180b6038950f1ff1fc1afbaab73ea4189808d3d9ae3388fad567", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", + "similarity_id": "f049e2f4b1410080c08b7fdd77e814e5032943642bfaa92e8d9293126a3dd0a6", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf", + "similarity_id": "4e5f465f56142a344ce9f324875fc4684f341c8f90ff397b5ecedf5a4c8a8d22", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", + "similarity_id": "d85c3901d6445c824c3205812d9e0b4ce0285ee1055db4434284d399fc1521a5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/negative.tf", + "similarity_id": "fbec022839c6cac31f117cceb5a9883392700eaa7c34d6c9899534dee636e5b6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "e5d0ff714dc834507f94824c26905ee1102f6d95c36d0970ecba2b12552a1619", + "line": 52, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", + "similarity_id": "2fe5ca60f925f1faa050b6a00f1e4ab559ece56062407fb40789cd0c6bf6f14b", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", + "similarity_id": "4efefabf083ba0758f994f07e6c0c6e2d03c049a9f9a811123260110236cf0ca", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{negative2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{negative2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{negative2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf", + "similarity_id": "acf8cb689ff30f9cb83a11625b86ebf6c3cc257db0561240c03607c1ba695af9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{mainvpc2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{mainvpc2}}].tags is defined and not null", + "actual_value": "aws_vpc[{{mainvpc2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf", + "similarity_id": "e2d8037886c3bdf488e71230a00947af99426033c301655a49e5cd1e82b2682c", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{not_secure}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{not_secure}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{not_secure}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "0e1caf5ee91f0953bd914f1e3b0cf3a467c663135c80cdcbf83213f12cd61a29", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "92035e70ffe2241953d3e583cc1aee9d83c867f810614838cd3b96f6f81f8f32", + "line": 63, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{dsg2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{dsg2}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{dsg2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/negative.tf", + "similarity_id": "24bb2934969beeb06f1b9bf414e98f9559e37d338267ed4dc409cc62756c3ff5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", + "similarity_id": "9e06c6e1603dd8174b1244ffe631c81c2a6c0615b012755155b90da9be3d0cde", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf", + "similarity_id": "1a38a4f86212d5c9cff8034f5cac14b43dedcc8e75cb3de8ed1501548d8490bc", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{default3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{default3}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{default3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "ae01458619d3cb08379e2a0f5c2a124ee3a1b661b6cf51b45d3aed0182a2c74c", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf", + "similarity_id": "fb60c9676378238bf5f34f5aa7f841dd619dc872a212cf9d3f4c2a21eef4e4ab", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive1.tf", + "similarity_id": "9ff674fd4c1d89108215f2de81501dde202d0bbd812b61ca2d3f6c249a308171", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "a2c0962dfe1ddb30bc455409d74cdec0bb5f6270dc34db13e1c35eef91ae90a0", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", + "similarity_id": "aa45110b8bbecfe4f26b3922eef575cf7b6cbe6cab7af1384c21615be13e1333", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "b5d8b948ae86e6c19f4d2cf517109c7544309b145da1060bea87ab910c8ac59e", + "line": 76, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "b9fcf85b215a6791f0022f2556eb62519ce78880e64f65531fed2c0b328617cd", + "line": 82, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst1}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "e55687ee31d44735838f27f843bf4fd3227a35648000cb4bfef50155133a56db", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{vpc1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null", + "actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "2cf8aaadc1efca770f97b345001c6f0190fa95e7ce02cc1588a2106866c5d18e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", + "similarity_id": "b7b19e20c75b99ab49ba05a22f01bf622c53d8e34d9ea9d6994f8bb470d6cb63", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "c9fd34d9d27088cbbb41db3200be1cde9add3b06fcfb2a9a3fe3ffbcac9bb3cd", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive4}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive4}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive4}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf", + "similarity_id": "984377e8134080395f285efdba53d519e77ff043282a27d57bf82b4acc881425", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", + "similarity_id": "982e1352848af2d100c1cf88786ce9227a40224239fb39791db67a6402cc4291", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf", + "similarity_id": "b44214e547049ef913befd33828546a087f82e1da2f82d404e27a6ee486868cb", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "afa43d50a177f29a4a706003eca3c7aab0d1f20685f5ba6e899343e73396fe50", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", + "similarity_id": "4a537f92c39af2b24f69c5d2d2c49ddd7f11d372bf0e254953a3b5ba4919cb34", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{enabled}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{enabled}}].tags is defined and not null", + "actual_value": "aws_lb[{{enabled}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "75f9777570c99ab5547d4497da40f432fafb4bd0c0da16ae3c970cd905682369", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "7c6dda3a73888b08142eece5daef8aed2e391630964731f9ede3c7432a41884e", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{private-subnet}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{private-subnet}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{private-subnet}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf", + "similarity_id": "9dcb841c390a8929c7cb81d0032414355ff366409eb63d444493b2974a3c5d37", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_config_configuration_aggregator[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_configuration_aggregator[{{positive1}}].tags is defined and not null", + "actual_value": "aws_config_configuration_aggregator[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "234f8e60da0d499c4c98e4362d24170bea533db1983a7f655643d14ec800bc98", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", + "similarity_id": "30941eb9e12e564ea70620a40fc2fffdfdbf412c2b1f67cbc12205a472650840", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_snapshot[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_snapshot[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_snapshot[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/positive.tf", + "similarity_id": "6da9cf1307246f14181930af7528366c659d7045350cc83a5bd5f65fc9726f10", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative2.tf", + "similarity_id": "1f8423f3889aad9b2069339841db249da47be9cb7de5f39e048a28becd8cf9b7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_server_certificate[{{test_cert22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_server_certificate[{{test_cert22}}].tags is defined and not null", + "actual_value": "aws_iam_server_certificate[{{test_cert22}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", + "similarity_id": "aae8be024ae2dc00ffeac6cb9018f52f300eb454c897055b7cf7f732fa2c01e5", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{positive3}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", + "similarity_id": "20c8f6c27ec76ef7aba62b59bfb7478e00320f3687506b8b1b9c2960b2aee752", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example2}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive1.tf", + "similarity_id": "bae526766626119cb4241a4ab7dafcd9ea56d606c8a0077a8a4be8190f1ff7bf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive2.tf", + "similarity_id": "018c21605d11540dd3a13a83992d6301d871c23f33dc9afbc8f697730c7dade3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf", + "similarity_id": "0016630a8c34f4eff3a0aaca9e7749a87395959b46f803c0feebcc13093edb6e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "06dafba0889f7a0dfbe15d7eeaa7b8399136eafd147c9dac89065126211ea45b", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "513e22c2f03628d40876f6fe55a78e2d6076e249adf1364ef3434ea1a22aee52", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", + "similarity_id": "1b3654352954d3259c45f249b3a6a32751caa5850cf4cbffb6cfc59d9ff0afb1", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf", + "similarity_id": "488b6284ac054f8288f53f91a33b5b9b66d46152a341cb85c6d946cb28f27a29", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", + "similarity_id": "7fa574ff6e00a8c3e7b9d1d8fe7fb6405cb5994dcaf4c2d7fcc7efcf9afdf0bb", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{negative2}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "1ae11b5c34bc8dfb1b6d7d138c7277a4324168128e335b627272496bdcf725aa", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/negative2.tf", + "similarity_id": "b8729e07b6b29248dde8401df8f2da902196ecba2e6b26ceab0471ff4fb5aefb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/negative.tf", + "similarity_id": "48e394d2b464d1f2da97d1361bdeeb22bc1c5ef4ce4e429a8e490374c90da544", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/positive.tf", + "similarity_id": "cf87a7640cd0e4bff87abe256c4a4238fe3c366ad643537058794d29a3938248", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", + "similarity_id": "a5b97d1e1c1f33de962232b376287796fd3d5e0bbbce702e8aeac1a39f1e80cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{disabled_1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{disabled_1}}].tags is defined and not null", + "actual_value": "aws_lb[{{disabled_1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "9be721d034a88551b79b7a398d01c81f3306365b98f2ff1ff5c4d9fd48098df5", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative_rdp_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative_rdp_2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative_rdp_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", + "similarity_id": "7fff89cfcd942ab435923c62da6cefde6ddd4fdaa81d1780e299cfd1a20646f5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{b2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "72ec12b487c7e9d3dd1e68580dfc5c974a98665278f3b1164880ccf14f86c421", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "e6dd823caf7a585dd7b65f62855a57a20ff57c92aa0beb81a8bd8c648b47404e", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "281d707fc8f4759d51c817fc8ab0a0be8ff772c3ec5839abc94a063a5097d074", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "5ae8b018575d04dd20b6e8e9440e73da7cc148ff384e5eac3e9e8498e7827d55", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{public-subnet}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{public-subnet}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{public-subnet}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf", + "similarity_id": "a0eee800f0535ef372677f08318e4864315e62f73d1436dbdcecf33d73c441e7", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_config_configuration_aggregator[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_configuration_aggregator[{{positive2}}].tags is defined and not null", + "actual_value": "aws_config_configuration_aggregator[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", + "similarity_id": "833afd15f489ca94f8359c3ab68974879c9f6432206fa58e45403f38bf62cdb6", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", + "similarity_id": "384563f2000b97b49c76c0b744d6f87657c29650bc3aaacd7d698613b494940a", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "3c7f7e1bcd73f128dd48e5b415f62bd2ffc62aa6a173d36305e31ef0659a1ad3", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", + "similarity_id": "8df4ab9d742dfbd7d76985f1cbc05ff9304bd86987d259c892761b433889c44e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{hoge}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "22c49b122aef8aa6218731b03f2fd0d2c6bf84e0cf5b7404d13b3b97b1c2c935", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", + "similarity_id": "a367c223bed4b262eb59cca637b5ac9ea9efa3179ff7aaaca4aef6889d717bf2", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{lb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{lb}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{lb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "2ee4037e0bfaaebca4de967bd0036ae1e23a1f4bf0fa8c1d70447102045ade7e", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive4}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf", + "similarity_id": "59fb9a79d5902a0a2f72436900db7bdd09cdb7b9d3631fcc7a1fccd62d7c1ae5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", + "similarity_id": "3834c9adf8937618934f261798ed8c0fc29537a0d215d89901e8e677d46d17ce", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/negative.tf", + "similarity_id": "0cf1391ca55a0848e6dcd111bf16c344c999b5c98f1b27866b6206d67bd5756b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_guardduty_detector[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_guardduty_detector[{{negative1}}].tags is defined and not null", + "actual_value": "aws_guardduty_detector[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", + "similarity_id": "833c6c3f7c9ed303a2e1612a4e6e7cc9ed2f10abeddf41b6b10c2ef375645f88", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive1.tf", + "similarity_id": "30572ab291cdf06c53feef4a67c31936710a3d67070170d90e109ea362a34204", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "2dd4f8f95eca6d6c33c448f433f98deeebf493bbb936113e3e3f35cf51d0498a", + "line": 86, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "3b52be7ccd4384373ae53b5a5c8ec90d022e3dea5d32aa74da9fda48131d0d84", + "line": 96, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst22}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst22}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "c114ffd1fe9e71076ebb5603a4029e258720b56be6654d604182b38455ec95aa", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "f8c357fd2709f9cac5ce2242168c25cda405d166748fdd439ff2874beebaf447", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf", + "similarity_id": "693c6b1b83cb84dcfc101c911b27826411c5715bf85cbc09ce92708485b839cb", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", + "similarity_id": "1eef4bcea4ae9f3a6acb090ab4a90f351e0e6ad94369b99eadf218205f82b508", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "cda229e77ffdbcbed15a49f4a9f3658b751bae35e0c6922c00a12679fc7ee9c4", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf", + "similarity_id": "6affd9e757245633559f25f56d3fc5bdc492c91380dd1face201c5fd701a2f11", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf", + "similarity_id": "13c886cd1452109a92b483cbb46860b8f77d2240f01348a8fdd10291b93b2af3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive2.tf", + "similarity_id": "3d08ddfd925693ab1c9c32485d35808588ac6d9abc1ea02ccdd49bac13fe10ab", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{service_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{service_2}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{service_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf", + "similarity_id": "fcd4fa42ff7d45e41e3f1b91adc6626b4eacc885aade0306a59e86c19834a7ca", + "line": 20, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user_two}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user_two}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user_two}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "f22789d04b8b1403818e4a411620937640f2b021874e9a62798db357ba773dd6", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{public-bucket2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{public-bucket2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{public-bucket2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "4332ace44f5e064a340c8373ae6d0243898f1e4770e5f060a6d4de9c9ebff5b4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "14927b7e021766d6a67464303fee04e8ab8360e7114086f20899791b2da23c32", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "a7d173569d7a016917bd5939a7bf51fef6a84ae3c328f47dfcbd38fb5d8e0fc1", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", + "similarity_id": "a6f97695d5a67f026b54b6737b70b7f02010bbd87714c915119fa0fa44aae6de", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive1.tf", + "similarity_id": "9f1e1a96a296750c993eb4423f1963e5ba213e06d7f8a30adf9a8af7809773b5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", + "similarity_id": "ce2fc142c4e77729ebfeeea61696cba28fd40b476415f9dbd02e9686ae8d71da", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", + "similarity_id": "4f44335b78daf819489d6f3631705ee15f67ae857c23ef9e59643fd4bfb16977", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{positive}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{positive}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{positive}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", + "similarity_id": "d804240d04d6e1dc57142654b2d1e8345d1d9addf7be6d8d47fba607c0d20879", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "7b30d19f6b76b71271db841a6c68752d006de9f41d3800af8bc570a7cbd38039", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "c662a1c3aff2e5d8a1a08ecf9c8ed67f9f62b0455136fdd9846ea635d653f11d", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{test2}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", + "similarity_id": "587d003f018d259d59ec27cb0871858678c6118fcf41b4b36e6dcfd1aae1f40f", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive1.tf", + "similarity_id": "d7b8a6817257fe11d9e53c30fdbeca3deea30081a7e5d8006fe1b6a257244c7d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{service}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "cc04f65894ecccf45706ad5f1bca8f368a9b7c97c13299574cc96166565e5d32", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf", + "similarity_id": "d97372acc69a3fc7cb235309877d6da7eaec1b19d082109142aa662089cca0ca", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_usage_plan[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", + "similarity_id": "b5053dcb7b2ad6839a5b2f498153f3ab11a56394110970dcf6b3fed99100cc46", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_athena_workgroup[{{example_3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_athena_workgroup[{{example_3}}].tags is defined and not null", + "actual_value": "aws_athena_workgroup[{{example_3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", + "similarity_id": "b07f5d0e0400b24fd67fd6b7f400b254ffc99cb9cb52cb16ff7d0b70a979a1a4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "bec8b88dcdd7274c0913ae55ffbb97e39181735b7beb02cede22aac4a6afe55b", + "line": 50, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{public-internet-sg}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{public-internet-sg}}].tags is defined and not null", + "actual_value": "aws_security_group[{{public-internet-sg}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf", + "similarity_id": "88d3c42ad9afaf18587c30b64e87e361b6e663520c45d5dc53f6e31d0196aa44", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "e4570226e23eff95f0e8092718eff2b6b165ccb72af1615709e124d653ee273b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", + "similarity_id": "1ba0e13f7133e120992d54567c8a436cf1c709b653a3c8a04a2c34b03f52704d", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_apigatewayv2_stage[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_apigatewayv2_stage[{{negative2}}].tags is defined and not null", + "actual_value": "aws_apigatewayv2_stage[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "54431b4ba109f780027bb657a4b01e3bf5fac5618443d38e7f226c1e9549955c", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "79edd38fe37cad070083c72c6c661c1bf760dcdae8c41cedc880daa41a7a1abd", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "620489c70fa3399b9a537d08cfa8225cfb43d3aaa5629d47b3bf29088c98e56c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/negative.tf", + "similarity_id": "80ee37016638db5b66f2bbd4535df12b9fb7b014bba793b2407c86a45d16497e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf", + "similarity_id": "2664f51812f69054da3e0d27289877929dce48dc24ebc3ff1facbac211825607", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "601f093f973a6a58c312a2ca5d41f76b6fcb08f132d9a1de86abb7625e5c03a8", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "6e69cf0147859cdf85c98abe63c36358c5dd505b88b657041bf6495aab32a05f", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{priv_ins2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{priv_ins2}}].tags is defined and not null", + "actual_value": "aws_instance[{{priv_ins2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "c5876b169aed55a45a3d6baaa838ae7089f6e3b7732ade59f743367130d863ef", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative1.tf", + "similarity_id": "de004ddfe8d1692f19f09107d29c4dbdbccb706646afec6a76f16698e59b1ebd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example3}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", + "similarity_id": "32209efdc9044e088525b422321326c3a6d649450837968a06984eb958841ef2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", + "similarity_id": "77fa4e7bf0c2ecf023209be8b937aeef6d09c078ec2804c53fc9806a904d7426", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "74ff7ba80ed7de629006cf6ae6088231c0c5bea9d025730d558eea523af280cf", + "line": 109, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst32}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst32}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst32}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "e1e98cefb5daa25c81cb08c90b4a4255937ebe2f08666808886d2d727ef3dfc7", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "5a925546150e29169991bebbb29441a61d21bf295d40b4c9634c0666c9a8c694", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf", + "similarity_id": "37c91425efaf2005266249ec1202652e66a5f58a1fcaf6a3af63353b938fabc5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{mainvpc}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{mainvpc}}].tags is defined and not null", + "actual_value": "aws_vpc[{{mainvpc}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", + "similarity_id": "b688aba31df36fda9b0c1d60e06992e6dfba6669e3660b7e766cfc13e29dc07f", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf", + "similarity_id": "cb38517d1e890b302216b8969a79d6ea9d572fa992fdfe20672e03c9c4730c8a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_route53_zone[{{no_query_log}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route53_zone[{{no_query_log}}].tags is defined and not null", + "actual_value": "aws_route53_zone[{{no_query_log}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf", + "similarity_id": "532e0628749b35e62484dc3c545e44837379ced4f5bf21b6981cec7544c1c255", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "83a3b5f34b9eb8e11879eaf2a664596d1d42178e34b09295dace03de04d7f347", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive7}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive7}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive7}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "d33885b4752c1cd6deba1a99a227057e340558dcd42e82e1bf886d1e8cb7562c", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "6c7395a794baba6c9988754065c2b636ae9956b4145496903e4ed1bfe4aa4bee", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "41f4819cf71faa08ab8c1e7224157b0b08896bf5b42a8cbb3dfb4f8ca4315655", + "line": 49, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test}}].tags is defined and not null", + "actual_value": "aws_lb[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", + "similarity_id": "09552c9d72f4901a6c27d4166d11507eaf9c7e09f17e0c57a9af37c28b5d2b22", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "ce678c19eac6251be9ac636c6c7e7f31f80268976461050404fa6beb49e28ba0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "aa1d0d9fd6d2fa93fa7ac9435af5359b3fa52539a4d4ce0751205d5399bc04ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf", + "similarity_id": "7942fe4ffb05fe2182a7065baba61b75c5fef5ffdb8af42eaf47dfe0e6161ffb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", + "similarity_id": "7e2cd7fa837fd18506c14769af66dfe98805792005b0b4e118ddcb7b468f64af", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf", + "similarity_id": "2de1f3d740a1dcbbbe19277e30c68fb82317786adc25dfd67dd872c3a969d180", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", + "similarity_id": "1fc945ab6ee52928421a34739f7a32babc4350d8243f5f44ab4b31aa4b3561c1", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "d326a8dbb9f5951b20c168526f136dbf556f66c563152e3597797b44b66c111f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_cluster_snapshot[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_cluster_snapshot[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_cluster_snapshot[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "521c81505724383bfb5396504d5ebd1d46fd841fccfb65efbede5b7d4406b780", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "a8e36842361b20aa35e38ce880f19d44fdf6bce0b8e25777ed5007cddbfa9e31", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", + "similarity_id": "b9874e27be7e0647d7af01881182ce65386a74f7271f4e1a9a2762197b761c75", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf", + "similarity_id": "081766e2a442d300fc35d57461730db9b2e845d070016bfcc7a1e9a50154f590", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_cluster_snapshot[{{negative}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_cluster_snapshot[{{negative}}].tags is defined and not null", + "actual_value": "aws_db_cluster_snapshot[{{negative}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf", + "similarity_id": "d785261b8dce77ade8a40b5986bf94213399251f92b9052f778a2ff484ff75d2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{positive1}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "0dd80711add1ce6378403c30483e7369758f34744d776c49f353283172c8c356", + "line": 91, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive7}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive1.tf", + "similarity_id": "cb9462d2498c9b18719f6b211dad05fb729f09d97cec3c112e371e97b622f414", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "bc329eca221daf5e6014092ca2157b910aaca4e2b0b3882e8e610899ea8af0e7", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", + "similarity_id": "3195f78cd8a542e0cc2b69e0c612503af894d467018cae708dcdd45190156146", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf", + "similarity_id": "bf6d88f277325c7349fd318c6e8c81adc9eff5752f89325c79dc030d45f227c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{enabled}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{enabled}}].tags is defined and not null", + "actual_value": "aws_lb[{{enabled}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", + "similarity_id": "a16d5ea1a614053a724e936eeeb384ec38d66281c71fd63bfbd170dada7a3ed3", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/negative.tf", + "similarity_id": "a175058a62776680ba122746d3246d3a6eec4e31f308a6b6a0f96c0d6638340d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{fs}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{fs}}].tags is defined and not null", + "actual_value": "aws_efs_file_system[{{fs}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf", + "similarity_id": "53ed9ee035d0162c10c3e8c08c3b725ce8a5762f69b9b37d099eac76e6246a5e", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "2f1f1c31fcfec200e1fc9859daa6f8af2b03b7a0ad0acb538165c7b95965594e", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative1.tf", + "similarity_id": "5e09ee363daca360c6150982522064e3604df8aa293909a7a8ecd3592bfd96be", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "d1bc013d22bd9b431fd0591e9dff453dc4d7a9d2c4d72327a991f24b3c155fed", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "160cb5262627941db1594fb9e6950b0d97f90fdbf924898b6f63720cad1401ce", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf", + "similarity_id": "3b40f0da0d97d24220cb0b37bbf35c02a473475326118f652f3cbbe22c88419f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redis_not_compliant/test/negative.tf", + "similarity_id": "35533628d428fcf760e95a652fa5ab00a44b8083567f688fa278b6e34614a825", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf", + "similarity_id": "1101d8de10e40f8bd4dbeca5395b916a9c7ce5bbd2cdc01acb40c9738416d215", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_has_expired/test/negative.tf", + "similarity_id": "0ed3a66686058d15e17422b4fbb0548bdc5b799b9ed5e9b87d6e3600c88b3244", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", + "similarity_id": "56bf6fcaa667c64d1719827f23d2c395b6878a2d868cd84156ddfa817a1f2797", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{disabled_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null", + "actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", + "similarity_id": "d4ec6345adeac1d529ac8db293520337be2d1318aa7e50352d3bd172e403f445", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{hoge}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redis_not_compliant/test/positive.tf", + "similarity_id": "20b4570b5e4a26efcf5f9bed289236093b7b46ae1c9f5d98b72ff93a0b2664e2", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", + "similarity_id": "e3b56bc8117c209f761a5bcee62f3c87318383c21502a59b597214ec673bff87", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{b2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf", + "similarity_id": "949a306a3308f3a06467af8857db125a7306d4c40184feffdf0d3d4009e9d8fe", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{mainvpc3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{mainvpc3}}].tags is defined and not null", + "actual_value": "aws_vpc[{{mainvpc3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "33b3deef328bef37410c6c04a01b0fad8daeb0a0bf531a592e4ee1259a295e18", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative3}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "e10ad2160d6ac745089e335b6cda69dd13c9a826d031035bb4aafdd5e8aae0cd", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/negative1.tf", + "similarity_id": "3c47dba1e9846e327a128b578dda73d118f61110f2d4df03bb7d450d10e349e5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "a9c98a90172b03a72986a5a934fc73672f08fa82d9e1fcf2da300b463bd98773", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", + "similarity_id": "8d89f8b1b51323d94d21e4fc36308492021da41cc8d95749bc80fc133bc1a8a3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive2.tf", + "similarity_id": "5000c8b54e1f5c18de4cc7dc43cb5144d8000445b21f51260a0155a171b5fdd2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example2}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "0485215ddd3b48d8026419cedc469648bd50e6c07a621a08c0b4e31f83f806a9", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "313358e70211b2aa3542a89e1dd0146dcd7d4db5a614befd496f95909166ddf3", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", + "similarity_id": "e2389542084f3ba7348468fe067f1023a16a93289872cc859925bd75aae5f8d4", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/negative.tf", + "similarity_id": "b5344e5f0dc48937a3c8af22cb5f15583372a82741e0efbc868c288725105f5a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "f7962d8c5aa507889fcd0615c483817c5724e8cef9287b202f0a4f4d86b7640c", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf", + "similarity_id": "880d9fc9b2f770a9be7c1038723c1956b4a6d38878bd1e6583d889dd4e4a9734", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_config_configuration_aggregator[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_configuration_aggregator[{{negative1}}].tags is defined and not null", + "actual_value": "aws_config_configuration_aggregator[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "50de1f16ce95091bc912f7ba8841317ee874a7c2e9e262054c31757297dd6685", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{my-lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{my-lambda}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{my-lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "7c871a31272c4ae39136cc911630e06f635882cec88835b888bcbee00635f257", + "line": 103, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{test-queue}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{test-queue}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{test-queue}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "87883982047b5e857bc246bd8e71e8e11616b62c965b75047f9b8e4f8cce0394", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "57b4362f2c9b2c41b471e0e188c115a892736b484e94586a6ed9de446f41112f", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf", + "similarity_id": "87552b3ce68c7e991e907c7249c54ac17a4f495458af641b3aec9702d98cc05c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "140a94d77dc6e84835f595a6fb50fc2c9d79bd3b1f90824063ce58295923e812", + "line": 28, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test}}].tags is defined and not null", + "actual_value": "aws_lb[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/positive.tf", + "similarity_id": "50b0d6121f1baedf2144e03de9d1b6c9ed9076cc397ad685f0d4441af04d105a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_batch_job_definition[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_batch_job_definition[{{positive1}}].tags is defined and not null", + "actual_value": "aws_batch_job_definition[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "3a7740697e63500d62666816c41095685563f0030ade329bd195c161946c5f3f", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", + "similarity_id": "6974389fb3d7caabbc30c6aa1659b4645da99d463151f04b894bcdfac89a0339", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{positive2}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "c0ddebf53afe007e0bfe45c1531d1a3f2e837471aa5b9aa28efe0900521837b0", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", + "similarity_id": "87671640449d67dc448eb5bef9fd3cbeadcbabf94706084cb37b1020a7d5f9c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "3cb28a46a92d9ec5e58b4c81cc1b7ddfc2f153703d6e387dc91b2f26b6ffa60c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf", + "similarity_id": "94bd70f63e5b28d52ebe2a594a5a6c8e91f45a88603bd3bc7acb92f2de8908bb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", + "similarity_id": "6641f2907e698ff4339895c7a12ff6449aa58873d52b42cfd8d58ea58ecc10a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "e64bbb0a3a0becc5cafd664fd8e62609e2d9546a8ec128b9c8cc28a3000fc2a4", + "line": 40, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative1.tf", + "similarity_id": "0bdc8f4e6320805d81e6e8e22e49b375132a2cf2ffd25570e78f08e8611ca657", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{secure_policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/positive.tf", + "similarity_id": "df900952faef7848302a280a53960a09dee624ac89d009415f5cd16faf0ba3a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", + "similarity_id": "b57a9cadd8183f300a98687aba9372f8c58d400be75d5a297c46776148490535", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative1.tf", + "similarity_id": "550a00588b31e605da782c1aa8b6bf2bb9e2d902d523ec40f90189008403366d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "8a622b3a313decf89e16ae1d5cdd5ccf83e7cc1bad2b672e82447520294cf99b", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "a37f57eb3663501b2807b523a87af9bceefaeac497d97ac445563e88d485c902", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", + "similarity_id": "f7a4bdb1d71f1d9fdd75a26b69ba5374136cfb14ea8b908d338e65540145582a", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive3}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", + "similarity_id": "dd87fa508d2dc1164be7b6d4d6c0cfc328a931d8a13f472064d33d9cde4b4bfa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "fcafc04f0436f043a3e96f82e5781d5e6fd8503b19f3fe7ec8fb2cd281ab8990", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "21decdd58927b41d4a493e3983846b6452ade1efeb092a674a1cece45ed0148b", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "b30672d78bbb6838e056bd11b4314ba3e07bf02d1d973fb3841b5f2022697aa7", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", + "similarity_id": "4851daee2c0d1a898e82f67d87c9ddcd3727506838b9d21d49ac092fec7dd1af", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example0000}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example0000}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example0000}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "f2e8d2e11b10be3f7b6b6837fdf37435c09a90d2150ffbceff1359319fcdda20", + "line": 66, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile4}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "87be0de6ab2fd60ca0d74fecbc385e00289636f864877ebe9c0ce63ecd82ef07", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/negative.tf", + "similarity_id": "0e4d096b9e40efa9af714d4561fcb748406d688259bb5b87beddf38374acd29a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "f03baaa27f8c837d97fdbd9d3e194b604a286b5bd4f8c643ea50ace15cbf622d", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive2.tf", + "similarity_id": "87243a3303da420997d3d18fc2a6e27a0071b5931209e7c27cc5b095c99e8cbd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", + "similarity_id": "52d6ee7fb5aad8b7620ff3aa604aa51e073e1e2c2aa0f8521ade710451affe4b", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "7bdb3b505e086a8a9ff635fac05bc14c989e8cc78caf5fb32f6da520598efe8b", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", + "similarity_id": "80c078fed0ecee71812797bf777b736c7939b9c09aabf8e612bfe7dfdee0aa52", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "e54023286799116b5615729250c77cd94324b2838265d1170002b8f1b928006f", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/negative.tf", + "similarity_id": "b96228815033408893ce8fd1db2cab1aa22a98d6e7a15695a9ae1c6ac2dcc8f6", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_service[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf", + "similarity_id": "7b71d1bbf0dfd7d94acc74db6a744ba4b63a5da80f047a0e0da35169e356068e", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'", + "actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf", + "similarity_id": "8781b118e92c6cb375673038a3b0c6fc45fe8ab85fc45eda36927bc77aaac83e", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_config_config_rule[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_config_rule[{{positive2}}].tags is defined and not null", + "actual_value": "aws_config_config_rule[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf", + "similarity_id": "7009c367e82c41f46df83dc6debe9d3773acd115793e6be228caa5b25f9d0bac", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf", + "similarity_id": "5bfe6770e71dc946ae0b8ee4820c83a84a1eb5f6fac48784fa1a7ec9f915c53e", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_config_configuration_aggregator[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_configuration_aggregator[{{negative2}}].tags is defined and not null", + "actual_value": "aws_config_configuration_aggregator[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", + "similarity_id": "677c8278ad8600fc8674ba7c9f975f5579bca11214be0970253b6d544371a808", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_apigatewayv2_stage[{{postive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_apigatewayv2_stage[{{postive2}}].tags is defined and not null", + "actual_value": "aws_apigatewayv2_stage[{{postive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "302075dff2a31fc6bc75e9fde67f1a221088d5da68ac01b51013ebd96815eacc", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "ae93eaa8e8f54e1bfbf1a4c0ad5de0151e93aef56e732de444da3d9ef9172ca6", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive2.tf", + "similarity_id": "5a9008d0d0138a984503ca53e2f51e478fe6cfde4178142bbe30051dcab2d506", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{test}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", + "similarity_id": "08a2d4c9429eec1283d35f14ed8e628c487a92fc2ad70fb90bb50a318e5f796c", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_acm_certificate[{{cert_2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_acm_certificate[{{cert_2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_acm_certificate[{{cert_2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf", + "similarity_id": "7a132fee2deb850f513fec0e5a8c05b6ad272a836551874715c2206d142e846e", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{example}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf", + "similarity_id": "e99ae1aa232256214d6ac75f69c61d7ca59e958b16a587363f151cc8834862cf", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "b89a5d79bd15d921bcf23099a523c1cdcd64077eb6bd136b2808adad61fbe66a", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive5}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive5}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive5}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf", + "similarity_id": "75d2b7920b52c18409959bacb4fc583cdce0017ea304566c0dbe5841ee4df2ef", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", + "similarity_id": "6703a70ede7cd94c9d9b74bfbf4f6d63ead29d11a3ffe4489a08044cdd4a830a", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example000}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example000}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example000}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "5169079fcfb849c9e81452116aff756bddde8694e23ee2c1c0402e8fe5849d98", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", + "similarity_id": "692d8ca81cf118529c0c61d2cee69fd0b470b73ff90a4cd7c99c58374af3bed0", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example0}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example0}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example0}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf", + "similarity_id": "d286ccfe47ef661cf5cd889c56839865a27f821ecc85d02b1ac5bdd55f095a9c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf", + "similarity_id": "2e8928c15569c8f1ee1579fc9e6db4c07a800a0d85d16c3a194b1750ff68615b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", + "similarity_id": "dd381de9d3f2bc4b9643ddec720880ab11f591e257e3ff28e7686820ed54614a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/negative.tf", + "similarity_id": "8a0f0afa6d548aa118b6a82ab18acf19588e25ed746aebe0759b260947d28235", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "1aa77ed9f6defc4e886074d8b19fb827a1f667b9397a84bd9a4110ead7dda527", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/negative.tf", + "similarity_id": "c7dd38d64d677270b9d504e080b48d7b439df8baf778d722250919b2886bda46", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "a79f146a43d4456332e8f82ec105c95ec0a6ce49a09c108290c01c94be1f03e1", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{example2}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf", + "similarity_id": "72e78cbcd82758fb522c583f9f26d59435066cab71316569f7c421ea9647f438", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", + "similarity_id": "27496f8453c01af6020c31c0f8bb66adf340d2d9831d5292e1c2974d17d95dc7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{b}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "32c367d0c6d39633be995a1b5fd139e2837c1a0e6e8056ed97e3b1619067256d", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{api_gw}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "19aabad4f15ebeef176560b97edaf0d8ab5f14a0c3857189c9df8857c2d2bf63", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "3e306bf41f303bc2fb3a70159ebf6ffae3037a5590853e4aacb7e92d40f6ea85", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", + "similarity_id": "414459e9120d1c2db94e518f0f39d10e05573c63fc3c543dc47823402d7f6527", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive2}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "7ebc38adfd68ba928e8b5f1a4559b703313c81ae00733ad8fc526b63633ec478", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", + "similarity_id": "3574319f06ac50530ea75de41741e64a27356835774538b286dae3568a0925e9", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", + "similarity_id": "06f473420868c8e813244902937352a115c34e523bc9aabcf2c7ef88d59c6ba4", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "44fedd3d0e9852f493cd03729c9b667c94955bba75eb872f309f8b9e527fbe3c", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{log_bucket}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{log_bucket}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{log_bucket}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/positive.tf", + "similarity_id": "04c54fa534401d08b72cc021c163b00d3f7200f7f03b3daed1e830447ba22291", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "224ef00b57315cbee0d10def11356aff91941d6bbbf433be7ee821649d472659", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "88dd6632bec2e94a42a6ecc01280c615ef11760dce5e111be53f09f00eb4385b", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "9f5724024ac91244a6b54b8d3725fa967f989df14d26c1cf055d8b3768623a1c", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_route_table[{{private-rtb}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route_table[{{private-rtb}}].tags has tags defined other than 'Name'", + "actual_value": "aws_route_table[{{private-rtb}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "0062acffb52169c9082bcd1a98ff5f7a87cae846e534a050c1c6458931330c47", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "9d05f0f68a5dad58d0e792151ea1214aeba6e193f2030f558479f0b73c06a5be", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", + "similarity_id": "f14eb8ec31b04320c7e7b05ba8c4988cbaa28665dff7fb317d8c855b6eb02f05", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "76047c4a4e7cba58c78b4c22801cd82cc7135c2cbe7e0a55a346b24091400479", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{example3}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/memcached_disabled/test/negative.tf", + "similarity_id": "49100f90b87e61710dc47a0165e8d552e911bb53a394c9a9021dfee6d579b201", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" + } + ] + }, + { + "query_name": "Security Group Not Used", + "query_id": "4849211b-ac39-479e-ae78-5694d506cb24", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group", + "severity": "INFO", + "platform": "Terraform", + "category": "Access Control", + "description": "Security group must be used or not declared", + "description_id": "eff2383a", + "files": [ + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "b34de59e36b34a4c19518a6e1ec353aacc1f0e996ad2f68c77b4c94aee19ef66", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "dc28977b6fe46ebd23c1da788a21849794afec7ff88a83ae7e4b568f0cab2b44", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "47c5bc4571b7341d7d35f2f25d310a7770c8247d2c18651b2ef273702d73da69", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "cc14c34ecf0b1d52eb75640a2c6575a5270c8111a859a95b4f1c90219a98e1aa", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative_rdp_2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative_rdp_2]' is used", + "actual_value": "'aws_security_group[negative_rdp_2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", + "similarity_id": "e849a2f5e998cba335bcfcc448d76a78a6d9374280b64e281181b389edb05877", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "1079df6156741ed31a5989b95d98656352ab73401116dc8c24e58e470479fec0", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", + "similarity_id": "0f0900a6fc4525d5f829110cd31568675297cd052d7d5614190d743124d025be", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "216dd7f494b888a497c227775ce036f483511eb7dad48e8cc2965dec635fe372", + "line": 58, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow-public-outbound-sg2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow-public-outbound-sg2]' is used", + "actual_value": "'aws_security_group[allow-public-outbound-sg2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf", + "similarity_id": "e55e34b27f1663115f9727fd9882dfbf8aaad2ff02b8acf0253027acb9acf16f", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", + "similarity_id": "fe7d2e8a70f2026b00b3fad43a6422b112ab7784f7e176de463dc85a211e2887", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "a91e0c532a2e0506b42ebad34088f61e924948d45f684f5af3f3af1a44d98191", + "line": 76, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive6]' is used", + "actual_value": "'aws_security_group[positive6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "9549b66a01e7d1b081807d3e10352c06582891c740a675e25ed1beffb58193d5", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow-public-outbound-sg]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow-public-outbound-sg]' is used", + "actual_value": "'aws_security_group[allow-public-outbound-sg]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "0c4b0988118981b6dafb6daad599122a0d8326bf0c7b44f8bc97c8260b97acf5", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "8b4e32fbf123be0405ac7075ed7c1edb6764a03a6c0f600e0bbd043fe7fd5f30", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "e9246e7ecd3569fae5a0663289fa276575bb8d768221093447162ab7ec4cc18a", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive4]' is used", + "actual_value": "'aws_security_group[positive4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "651ab242e3ed0e3232e9ecc1338bb81c13a04cb6d5395c6dcfaae561e6ec3747", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "9119d6bf141f7ae79f599c17792116ce832a1e31c79903f3470a4121148e65e8", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "b09959d54b5ac1e3d7dbb0cbe0f86f688ca480ade3bc4f57222b8710cdaab200", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf", + "similarity_id": "b0fb6463e23378a02e2e53c337e1b1c2d991cf371bdeb9f3e6480f437c6fa250", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive8]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive8]' is used", + "actual_value": "'aws_security_group[positive8]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "a0a3139505f7bbcd611f4565b35010aed1622a591f24f4f840f290702f2f7c3b", + "line": 50, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[public-internet-sg]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[public-internet-sg]' is used", + "actual_value": "'aws_security_group[public-internet-sg]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "0b14bf9f8abfe6aa8342f5061208b923a5fbaac7f4690a4f648e02bddfe75d25", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "a09497235def90f1eab9bde9aaa2515b8445b2e6f1400dd4b7cdcd19e93b8762", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "c635380bac05c17e10f99691ed4255aec4ca1abfa4be40e2f68c08faaf40e0f8", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", + "similarity_id": "cd1febaf834c4d8ec3af6c2564a91cccc9efa56a0758769565d01189a25116f3", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive3]' is used", + "actual_value": "'aws_security_group[positive3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf", + "similarity_id": "92b08ca77f922f792758fd694e9fc60488e6f22ee54ac6271e9a4a666a588095", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive5]' is used", + "actual_value": "'aws_security_group[positive5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", + "similarity_id": "ecda9b69ab0e79a39243a5e0501cf01d3f5ccf44d92d4b78c743f5e4df5e05f0", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "910c495a10ef47ae63670f61e44a2e7b241014d2c94ee66aca6b0bcc4091fbc9", + "line": 76, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive6]' is used", + "actual_value": "'aws_security_group[positive6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf", + "similarity_id": "8822ed74f1b9d332752c9ef43df283f1d70a4f7e813b566daf7e7724ace7fe8a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "a2bd20a1fcc7064cdc9668ce502200a7232c2e493cddc69a428d69886c4afa2c", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive5]' is used", + "actual_value": "'aws_security_group[positive5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "29b69e4c381ab151863df423323d370f2dde43322ec602c61a0cda9bfb6e4acc", + "line": 26, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "e84114fdc3e07676e30a9a18529cf260ab319e3f09c638e28e108ae7460de17a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "0844f97e566c95a7a7a29e760a31e011fa8ea2393d2463649543b83e12dcdf7e", + "line": 2, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf", + "similarity_id": "33dc6947723d8c375d323a85c0fb359e8bdef2064fb8c55bf58473b2457f6c21", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive4]' is used", + "actual_value": "'aws_security_group[positive4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf", + "similarity_id": "ffa16e12728f9e0505e07000dd4fe2222ca948da262ba455b40a96eacecfe67c", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative5]' is used", + "actual_value": "'aws_security_group[negative5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "b5d2974424ee695207aea177f2cb0564e43e9557aff46635ee90b1b20631d2c4", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "d322571bdc80e01ba976aae4f31d4f0cb4077aa7037caacb0f3e6a9e9d2360cd", + "line": 106, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive8]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive8]' is used", + "actual_value": "'aws_security_group[positive8]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "ba7b211e54bbd61536a9e92c90493294de1b3e795db86cd6eadb70496eb37172", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf", + "similarity_id": "85550e4d81596ef63fac7f8b73c8be29469e750bb4f79eb25d46cba32ef8075f", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative4]' is used", + "actual_value": "'aws_security_group[negative4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "4b474e5eab73dd28051e418f6d88d3ba6603074cb502dd30553a2e497cd4a875", + "line": 76, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative6]' is used", + "actual_value": "'aws_security_group[negative6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "970b6ae9b54bc9656952dbd86602f6872f9ca2fda1e337238b0ab239c696cd09", + "line": 91, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive7]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive7]' is used", + "actual_value": "'aws_security_group[positive7]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf", + "similarity_id": "9e503201ba640d6a6a0036ccf71576206d33dc737878f95dfb9dfa5669172a2b", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive6]' is used", + "actual_value": "'aws_security_group[positive6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "44144dc84cc32ce00ef6081cac87492c058b862dfa05b5e0947a3866640200db", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "6fb86ee07fa3ab4a26faf6ed504b5e31f5312329e7712be3a5aaba49baa5473b", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf", + "similarity_id": "1c6871ace99b13429234ecd360e86d39ce4b5560b94cca1bd33be9ef50c4acb1", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "8802e064969bc916d4ef02f06c9c47892d2f3bb4eea6c11aba564085d31d424b", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative4]' is used", + "actual_value": "'aws_security_group[negative4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf", + "similarity_id": "bd267f1f2745ba7ad91ebff57611c6c9e54fd1321b8dea14d5acca714207b4b6", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive7]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive7]' is used", + "actual_value": "'aws_security_group[positive7]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "abd08f520c5633eed72885d441db5a5936387c4ae3d7db9c60e9872bd777f4d6", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive5]' is used", + "actual_value": "'aws_security_group[positive5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "c95c36535d0a7df2c176b0810f6e5d48a51f4f579f2a67e68cd3d2018699a00a", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive4]' is used", + "actual_value": "'aws_security_group[positive4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "ee144dbb3085387c863df92f0e41c0edd378c451341a233093f83b4be1ee2539", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", + "similarity_id": "9d9754ff06cafa80f5475027c863e8913007c0d76626b1180a5cf2d638996b67", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "ae737bb212b1cfb8a2c806120abb34711cbc63025a8c15487961dd5801395414", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative5]' is used", + "actual_value": "'aws_security_group[negative5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "8ee3d3a402aa43b6e3f2cf54c44bd8fccc285e9a0d0bf7749fdf16cd6af15057", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive3]' is used", + "actual_value": "'aws_security_group[positive3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf", + "similarity_id": "1b16280ab89e00b2f2c57b95936f5a209c7d76840fc62ee9e39618c4b13adf1f", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative6]' is used", + "actual_value": "'aws_security_group[negative6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "474863073ae8b9ecc66d74c96204b36a3c0a32a18265bb861fc9691c62cb5ca4", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf", + "similarity_id": "3d7d71e2acd96134a31a44c4888dd582061f87e9a4296654a353724b54e4149a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "bc83bbaaef7e527400c6f92f17637ed599e8ac54e48d4fd51534190b381902e3", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "f4c4b1830fcf0beb1dc337de174fd08fa644a25dfa5f85412ebe61502dd8573a", + "line": 76, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative6]' is used", + "actual_value": "'aws_security_group[negative6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "e93ee550ce0ee01418b4a1c02a5e048a807c14670570c7512f7ab5d50fd4a274", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "7e073fef54b77d57fa937bc30efb9239c7ca635f391827f864da47aca36ac61b", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "8f046721e55cb8c7c1d792300e6509f2765fb444819c40fae9c3cee98b3ea794", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "4d4a207a6527f23a4692690dbb93ce8956dd3262df1bf934e6924e0bc12cd1f9", + "line": 91, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive7]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive7]' is used", + "actual_value": "'aws_security_group[positive7]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "73f99f67ba58819a427b3ebc2195436342b23865ad1b69a96276d71f43801826", + "line": 106, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive8]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive8]' is used", + "actual_value": "'aws_security_group[positive8]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "36165878b6d660e01bb0e87cf7c9d160084eede23de3db5a5305ec2882bf6389", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative5]' is used", + "actual_value": "'aws_security_group[negative5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf", + "similarity_id": "59f6892722fb687fc6e9146824f4083677d37b4ce4ae2d1bf3001b1566659e08", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "b07dd9f1938ae90bc88bb632d5005d911ea42b641ade6af94d3bd966a9f9a678", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "3b39fe2fbe598d59b160f091d9372563ffc7643f2f0031ae85669b3c83c7f651", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative4]' is used", + "actual_value": "'aws_security_group[negative4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "76b7c3aaf1da33fac752d44d1160f90bb008fec161489243005ee2beb7278e5a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "11fa9ac15d69d8123ce1fb038f3086a7621d7c7fcc4fc40470372a5bef90a172", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive3]' is used", + "actual_value": "'aws_security_group[positive3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "d9265eeefbc0892b393fd33b7d3188f7595eee896631bff626666ae606131752", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf", + "similarity_id": "79736e14b588a95ce6d2b547b4433187e32f6b99348adbe8b12f98af96dd9547", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf", + "similarity_id": "a9edad357d7df714428d702fd554dcb88855d77ed56f94add9b002e863b3c896", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive3]' is used", + "actual_value": "'aws_security_group[positive3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", + "similarity_id": "d4e7db0358e3d6347e46e46bbdd7e88f2a0820270b40061629d50a192091bded", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", + "similarity_id": "36440f30c6b51ef6561c700d8c4a8502d89631075c7477858c39dc84bb228f10", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + } + ] + }, + { + "query_name": "Security Group Rules Without Description", + "query_id": "68eb4bf3-f9bf-463d-b5cf-e029bb446d2e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "It's considered a best practice for all rules in AWS Security Group to have a description", + "description_id": "cee242dd", + "files": [ + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "2dc0890b59a106e2cc426d77c23e9c522a9a7d035f1e09574ef6e25d8bc0424d", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", + "similarity_id": "3daaac79ee6edcaf76dcc89b9d01d077cce8b198635e77101b7af5e926ed8641", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "4862ce071bb1d363b000bb53ee240dd6ce35c559be4b0e6d83e1fdc9b7e7314a", + "line": 58, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow-public-outbound-sg}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "100519cbdcf3df4d0211a20cb28c13adcd5d3a41b135d2503ebfcc726c54b90f", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "45afdd7085631fae75df9b1cc77c348dc1e8205c8d9ed4247dbf6451bd4dbad2", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "8b5418ea08b72998227db1ccdd96661374704e9dd758d77b927ebb078a84251c", + "line": 62, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{public-internet-sg}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{public-internet-sg}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{public-internet-sg}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "f363c10a06cbd3031d28c22bb804d8fe9ac6ea983fd34c5cecf6c09f9e3470ff", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "411575ac5d72e413a809b85a05e761ba96e7633770e49f89b40c9e1df4e45bd5", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", + "similarity_id": "8db84596a4f3c9ed090cb85b1ba47ec6bff3e2bd46a4fa67eb6e30f1128c002a", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", + "similarity_id": "e6462b6dc7888e2303da32d39a6ca6492a7f970dd6ffbfb0661983a49eb49f15", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "cd5b8301be50491b2efdb0fc76328180ba90a0dfcc92d4f0cfa27574d1bc9035", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", + "similarity_id": "78e5e7cadcb973bb9b1edd29dc451d181fbc58bce43d62058e4271a87ce9a688", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "e364258f261f1f792e394a9fa474cc907c412e6b7b152056fa142293c8e3d81d", + "line": 19, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "66303822c8f1bb7301836bc3106b13500cb007ebda808c4055f6c6de042eaf03", + "line": 63, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow-public-outbound-sg2}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", + "similarity_id": "630f14396cdf3166c5ac459ba9b4e3011129ee94ea36e24575884f1b8641aae5", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", + "similarity_id": "22cb57ab0377190165707a44fecf388ba1c081fc3bad1e7f064c3b5be49902e0", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "fccd7ce54c2f81017555931784cea70f2e01361f00e4ac8a03695c0040ad0964", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "22b988c42c73026fb8616bb9756b84ec39d8874a19554c42878fe3bb8c747ac5", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "3c150a59c35c8bd3e463e4f250c4ebbd6f99d2c9323f6a8bf33b682f92be0de2", + "line": 55, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{public-internet-sg}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{public-internet-sg}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{public-internet-sg}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "f0287963b35b539518c81d5e5705038c7a093b37ccd86e04984a5cc2ccfcf7c8", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "18976e48fb2ec3241f93fb5eabce67d71feb122559e9703096eec271454f8caf", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "646e5183aad86fcdb33b2dbc958c0021df017a383467ea1a8e727247723f3412", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "a823d1d90808d0393349ec071a2d231c19f39d83371b1dbe39c1061428f233ba", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "2bc8be5c1319dd1601fab22812dd209065f13deb48748dfd74c18d95f82d89f1", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + } + ] + }, + { + "query_name": "Security Group Without Description", + "query_id": "cb3f5ed6-0d18-40de-a93d-b3538db31e8c", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "It's considered a best practice for AWS Security Group to have a description", + "description_id": "bc535d27", + "files": [ + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "97295dc3bd259c7e904b577e51bd58c118a70713285e524a540cb130ef33029a", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative_rdp_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative_rdp_2}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative_rdp_2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", + "similarity_id": "cc27ed549e2644065d4800aa7d84131465c07608116018b6ef0b57e894e04434", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}] description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", + "similarity_id": "6b9ceea4e2161112b8bceecf47b8345cec460bd8c845ce32de6676d69371e044", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative3}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "f25c2a2ae6ea0b4f2cb887b2f33f69ce1569f7b00a0522c8c8d667a4ded0cca8", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "478294c875a639c111f30cc1a334adb94d041dd954eb079c60032546b49e6a82", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", + "similarity_id": "908a0c7610f98be7cbcb4b91fe44df06b11c2a83b199a56ba1399d8fbead49cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", + "similarity_id": "2c0c6e0149f1762c8cf78222421d2f2b8326c3426b28db7f88d03032570e5735", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}] description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", + "similarity_id": "220fd79273145fe5498f8f7f17e043b9442d52572d2c254f4a210fb1bc6bd824", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}] description is defined and not null", + "actual_value": "aws_security_group[{{positive3}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "ba762cc45131836f9b5f790de302e30c86fae6eaecc9519ca2ee8eb58041bc68", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative3}}] description is undefined or null" + } + ] + }, + { + "query_name": "Variable Without Description", + "query_id": "2a153952-2544-4687-bcc9-cc8fea814a9b", + "query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "All variables should contain a valid description.", + "description_id": "b44986be", + "files": [ + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", + "similarity_id": "62078456419f5622852ab8cf84462b2c74b43b06744b5a34c25e80b23ad3d702", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "41f26963a12df7c1151d97bf1b5d0709e431c561c906b7167901c764ae171689", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "variable.{{private_key_path}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "e381b53ef16b9c328c196929a5a26d4cdbd82d2977ea71dc4d596d2f74f98993", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "variable.{{region}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "0a7073b99329a57cb649f1c21da1367d170f02d41ac2e6e5f807d0109d2f6d6c", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "variable.{{aws_secret_key}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", + "similarity_id": "fa3f91cba9cd74a984e00c25bc2ac49ea65a279447c29c89176fdc4a3a035b78", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", + "similarity_id": "48d16e18162d19cf802b6e0c2aef11f2d50246dd9fdd7787b771ed385a8da0a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "c76818170cf4777255865bde01f29c4e33cd086469dbbd4d02b45e68afc24c09", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{aws_access_key}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "f6232ed43785f9d741f5a0671caef48ec4a173afe1c72e0ac5b581b8ed97343e", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "variable.{{key_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf", + "similarity_id": "1308d0e221e62b1e083f26fdfe97a407ee9dd096edc25877020b7cf9cdae2248", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", + "similarity_id": "df50786a61ae71ad217393ae9d4606050a29c48a30c9eaf8e958a0ca8021c4c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", + "similarity_id": "3ef461b9af906c94d782dfb45daf8edb1d5007e815eb6b42ab5a9190a5ec4b42", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", + "similarity_id": "022f0f34de59966151af271df69219e424a7f374245ee40c7c75aa2f6e8a4384", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + } + ] + }, + { + "query_name": "Variable Without Type", + "query_id": "fc5109bf-01fd-49fb-8bde-4492b543c34a", + "query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "All variables should contain a valid type.", + "description_id": "bba696eb", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "19c801966dd2da16397ad711be930605bd6b1a1be3b41f0993e8d883934ad502", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "variable.{{aws_secret_key}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "6684e95bc8f93fd55f4d3a5c4890655b3bb5591bc18227c940930beb7637d06e", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "variable.{{region}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "f08f903d32e8d577c959094b07d53f57730ad1af1a848156b65ac30025508d7f", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "variable.{{key_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "2a6e2d88043d99605c846cb8c13e1c90470d7b25e81fa49db30c7316cf3a47ed", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{aws_access_key}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "e340e3072f2ef20a185b495b9e412f688cd60f72a7b78867f42c2e525f335e23", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "variable.{{private_key_path}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + } + ] + } + ], + "bill_of_materials": [ + { + "query_name": "BOM - S3 Buckets", + "query_id": "2d16c3fb-35ba-4ec0-b4e4-06ee3cbd4045", + "query_url": "https://kics.io", + "severity": "TRACE", + "platform": "Terraform", + "category": "Bill Of Materials", + "description": "A list of S3 resources specified", + "description_id": "0bdf2341", + "files": [ + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", + "similarity_id": "3cfe47bb5e3c6349b98542d91ee5274ed5996f4a13a9e471b073f5ce1582d99d", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", + "similarity_id": "20b34fd0c662cb32feced3769c55bd76e0525536aee17c586a2ff36859817714", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "e84fdc991f347648effc622245b9ca4ef7a8db1d439f913cd3c2311ceadfa007", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "aaac2e1ac7eae46819429dfac5e755cf0ad4dac75d51e3b412df9cd3ecdd801f", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", + "similarity_id": "225b5a3547c7224092d4e7dccb8b044bb8349dd52359285a8b3743dc7d33957f", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"Bool\\\": {\\n \\\"aws:SecureTransport\\\": \\\"false\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "ace6a40b375fbd216848326213cb26a261effae0af44a71a13a951710ff4abd5", + "line": 5, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[public-bucket2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-32\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", + "similarity_id": "fa667690d97015898c61ace4b7f7384e1014c124b7a9f58898ec55244e0b2f6e", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read-write\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", + "similarity_id": "e3fabada99372aa90bdbaa4ec222083b804ddfd18ac6bce27ce80dc566ca84c8", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"IpAddress\\\": {\\n \\\"aws:SourceIp\\\": \\\"8.8.8.8/32\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", + "similarity_id": "b208adf02709122124fcaf5c0a9531965c66fa008cdc2d83ba09af2b4dcec1d5", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", + "similarity_id": "5613eecc821464ca8934d3c2c8fe0c84ef382bbbdc83ef78d96e853511b641dc", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", + "similarity_id": "06d00bcf29f3f63e83fee5d9971e5d244306c97fbdbcf82b9cd43c13223e08a4", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my-tf-test-bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", + "similarity_id": "bb28259b6d8d780647c6fe0d93b3682ab79c869e1ec23275c0564bf222e80f4d", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[hoge]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"hoge\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", + "similarity_id": "a0269cda7a646c8aaba0dbb4b7f88e5347027d8a4c4deb514d83fa9b85e71774", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "e5a588d03ed11119b0afcb00362423fb68d1623a82723ee51747d426bbca6988", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", + "similarity_id": "f466e21861d0d5f6bce99223e7d54d0e7a2ff556c78ce30b38abf5e598fc4419", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", + "similarity_id": "5d021c75ef09a3e9e8103c6c6f98a9ac83ebf924e843ac79342e221540cce2fa", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", + "similarity_id": "91d6fe9be8dca86488c76245854106ce1f9124849e3ae8dc59b391bfadc3a582", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:*\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", + "similarity_id": "705d28ba4cf90b667145415031ab834a69916db85ede5128933e11d6f7c599cf", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", + "similarity_id": "ecbd8d8be3c3aa0925bb400f55a414ee85e50d8206125a585fb859b6b7399403", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", + "similarity_id": "36a6df64dff9bdbe2b749f8ab445bc51774b63e36e47af8fc66fdf7e00c2f5d1", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", + "similarity_id": "fd23b519d9de3c9e937d36c6c15ed6b2d30857d14504942ff8594acd02238a74", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\"}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "8aa92d328b0c2510f739b1ea6307d0f1e4cf7ac9260d8b5c2311b74fb824153f", + "line": 69, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", + "similarity_id": "184e8a008eeceb0d552201392fec564a5f78683cc4baae6ad1b2c3a3b9b63cd9", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", + "similarity_id": "f4441d44c8dce3d033bc61abad849e84e0a20fff1a0200445cadc9a70d6ee1a2", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", + "similarity_id": "671b661eec245970e807af4391c3ebbb8541d19388b8fb499ce71ff70c3df226", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", + "similarity_id": "930988ac27e4f1682a2299c1e8675787b24e3572ce516a4e41ae65f647a8ea14", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", + "similarity_id": "96b65d7ec60d5487931d8a786e663b5ebdfdf1b909a60dd9be4984892fae3a79", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[hoge]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"hoge\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", + "similarity_id": "1a0ab5ee1405fb6fbf510f27412091d4abc0e7ef3f045c03e883a80ba69abe0a", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"cors_rule\":{\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000}}" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "1bfbe33817f5456a6025a9d3b83fff5ad8001dece3b05b58f59d0d9f3209f064", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", + "similarity_id": "d724252e60d639385ecaa09935add198de4965fd23e3ba8dc842bcde1bcf3af7", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "9ef1ca02e068fd6e648c12ff0ef580b3ffcfc6dd8029f4f3f90be64da3a8e855", + "line": 16, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[foo2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"${aws_s3_bucket.log_bucket.id}\",\"target_prefix\":\"log/\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", + "similarity_id": "439cdfaeaedcf60ccb07cfc151f55de34864a6fd9017faac60039058b67210b5", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[examplebucket]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", + "similarity_id": "c3ad79e29a0d7155321fc3d0f9047b7f34ad844eb26b14e62f07e75230d1ebd2", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"some-key\",\"sse_algorithm\":\"AES256\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", + "similarity_id": "d9ded88fa570d9a95bb6addc41877ba64def60b05b7ed2782f03b96b5531b695", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", + "similarity_id": "dccd9ebfcd719742700a961317fde677cebcc3a50c0b2f7bfbe5dbe24f05ed7f", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "1f6f4c688f980a8b94aa9ee3fcc1611c87d25a564fe9fbec7396f2fe9378d027", + "line": 5, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[public-bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-3\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", + "similarity_id": "f4cb214e402e7f6a4f7ddfef2574ab338a3e9325928d82eb65b922101520fea3", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", + "similarity_id": "8ca0b7b2a315fa9c1b6b28f38213fd72ec27c8c29e14ae2390f7be30bce0888c", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "feb3a1e708d932c7e9e508e91410f12018c53eba1a3d0a73bc7ff64f98a16603", + "line": 19, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "6da57ecf0ef32da4afbbe03be3c29560a7ab8d3201aaad13258ee1dcf3dc6fab", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", + "similarity_id": "70a2a1a20a3ef61e2c52d44a9f51f6852f0f97636e5b977342dac5af1af9c5c1", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "7d38380efc922c9e2a2138848f3227358107e15b153acc4ae67f45b926ed1082", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", + "similarity_id": "03ef4eeb44cc99c658039cd3a974e8ca5ef27302e7e9ab8f58f4a73ce8998a0d", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"GET\",\"PUT\",\"POST\",\"DELETE\",\"HEAD\"],\"allowed_origins\":[\"*\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", + "similarity_id": "81ae4518a54b75efd3cb1199be55b7afa3201173f3ab119a53b8976e3af7c79a", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"website\":{\"error_document\":\"error.html\",\"index_document\":\"index.html\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "67a97d3821c1fb10e749d6538a7eeb690825a3d79350caeddbe531e56416c0b9", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[log_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"log-delivery-write\",\"bucket\":\"my-tf-log-bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", + "similarity_id": "6604099d7d3c93c84624b67926d65094d828398b9d5e4327cfb842a50a411e49", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my-tf-test-bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "e511aa399e157dd721d42b9d3249def9a50cd140337857f25fbe0df00d64522b", + "line": 20, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[foo3]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current3.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", + "similarity_id": "198cbc0ccc999475689626fcb64a6544d288966f5bcdfc7983ed4d41a1081138", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"authenticated-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "95bfc44a4337badf496c97f0bf8648e21203e4020878a018648ee2ee71ff9424", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", + "similarity_id": "ad415d657ef54484a27a9f197fed0dfe922f5d57dfa3347107c896ba28354b0b", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[examplebucket]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", + "similarity_id": "4284ee3c815ea34a164c9d1d1bd41c23f86401c80c0dd3671a0dc5aece1ce4eb", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", + "similarity_id": "ea34f358f6e9d96683cfd53c5785ca7c6b5c3cf85c75d3574788bafe0bed6abb", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", + "similarity_id": "b49586a525c02b6b1e996a8dba4269c7eeadfb794ac7df7dd8e0bd10ae7456b8", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "52a4ead57d40049da3b0f60cf9f8c992a47f0cadd75bf761005121133a01979a", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", + "similarity_id": "c7953fb7aa44cc79fd055c52cc70ae98ed42c2a4f4bab036a614061ad00bbfc6", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", + "similarity_id": "dee2e88009ac8e34ef3d5f02bb802ecc43558d74ffdd71f83f41ab656a906301", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", + "similarity_id": "f5aef5e494ab7efdbecb94e4c7e2dbe6ad95f06addd2ffffcc01a47e2e24c1c2", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", + "similarity_id": "ae3ded1985cb283bf170c1553793a5815577ad55acd8be6768c9f1e406f3ac7d", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", + "similarity_id": "caff2c6eef0e43d2e2a2f609284d4a965372bfd162398996b3dfe3f1677229dc", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:putObject\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", + "similarity_id": "9430b62718b0a7f9273c57285497bf4c6230b960dbcee3ee1735d54d5ff25140", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"${aws_kms_key.mykey.arn}\",\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", + "similarity_id": "7c0a7ad742cf3016ba7ac1deace3421835f5a1d6230cbc5d4aae22702026985f", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"logs\"},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "76144ef296c0cc5b8505090d561fff1e126e10d71f2c7a6b21932eddd70f5bb5", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + } + ] + } + ] +} \ No newline at end of file diff --git a/src/commenter.js b/src/commenter.js new file mode 100644 index 0000000..bb1a433 --- /dev/null +++ b/src/commenter.js @@ -0,0 +1,88 @@ +const fs = require("fs"); +const moment = require('moment') + +const kicsLogo = "https://user-images.githubusercontent.com/75368139/136991766-a4e5bc8b-63db-48f7-9384-740e9f15c9f6.png" +const severityOrder = ["HIGH", "MEDIUM", "LOW", "INFO", "TRACE"]; +const severityIcons = { + "HIGH": "https://user-images.githubusercontent.com/23239410/92157087-97285600-ee32-11ea-988f-0aca12c4c126.png", + "MEDIUM": "https://user-images.githubusercontent.com/23239410/92157093-98598300-ee32-11ea-83d7-af52251a011b.png", + "LOW": "https://user-images.githubusercontent.com/23239410/92157091-98598300-ee32-11ea-8498-19bd7d62019b.png", + "INFO": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png", + "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" +} + + +function readJSON(filename) { + const rawdata = fs.readFileSync(filename); + const parsedJSON = JSON.parse(rawdata.toString()); + return parsedJSON; +} + +function createComment(results) { + let message = "![kics-logo](" + kicsLogo + ")\n"; + + message += "---"; + message += `\n**KICS version: ${results['kics_version']}**\n` + message += "\n**Total Results: " + results['total_counter'] + "**\n\n"; + message += "| | Category | Results |\n"; + message += "| --- |--- | --- |\n"; + let severityCounters = results['severity_counters'] + for (let severity of severityOrder) { + if (severity in severityCounters) { + message += "| ![" + severity + "](" + severityIcons[severity] + ") |" + severity.toUpperCase() + " | " + severityCounters[severity.toUpperCase()] + " |\n"; + } + } + + message += "\n**Scan Metrics**\n\n"; + message += "| Metric | Values |\n"; + message += "| --- | --- |\n"; + message += "| Files scanned | " + results['files_scanned'] + "\n"; + message += "| Files parsed | " + results['files_parsed'] + "\n"; + message += "| Files failed to scan | " + results['files_failed_to_scan'] + "\n"; + message += "| Total queries | " + results['queries_total'] + "\n"; + message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; + + let executionTime = moment(results['end']).diff(moment(results['start']), 'seconds'); + + message += "| Execution time | " + executionTime + "s\n"; + + return message; +} + +async function postPRComment(repo, prNumber) { + const githubToken = core.getInput("token"); + const octokit = github.getOctokit(githubToken); + const results = readJSON("results.json"); + const message = createComment(results); + console.log(message); + + const { data: comments } = await octokit.rest.issues.listComments({ + ...repo, + issue_number: prNumber, + }); + + const comment = comments.find((comment) => { + return ( + comment.user.login === "github-actions[bot]" && + comment.body.startsWith("![kics-logo](" + kicsLogo + ")\n") + ); + }); + + if (comment) { + await octokit.rest.issues.updateComment({ + ...repo, + comment_id: comment.id, + body: message + }); + } else { + await octokit.rest.issues.createComment({ + ...repo, + issue_number: prNumber, + body: message + }); + } +} + +module.exports = { + postPRComment +}; \ No newline at end of file diff --git a/src/install.js b/src/install.js new file mode 100644 index 0000000..de08661 --- /dev/null +++ b/src/install.js @@ -0,0 +1,128 @@ +const https = require('https') +const filepath = require('path'); +const tc = require('@actions/tool-cache'); +//const releaseDownloader = require('@fohlen/github-release-downloader'); +const os = require('os'); +//const decompress = require('decompress'); +//const decompressTargz = require('decompress-targz'); + +function getVersion(version) { + let path = '' + if (version == "latest") { + path = '/repos/checkmarx/kics/releases/latest' + } else { + path = '/repos/checkmarx/kics/releases/tags/' + version + } + const options = { + hostname: 'api.github.com', + port: 443, + path: path, + headers: { + 'User-Agent': 'node.js' + }, + method: 'GET' + } + return new Promise((resolve, reject) => { + const req = https.get(options, (resp) => { + console.log(`${options.method} https://${options.hostname}${options.path} ${resp.statusCode}`) + let rawData = ''; + resp.on('data', (d) => { + rawData += d; + }); + resp.on('end', () => { + try { + const parsedData = JSON.parse(rawData); + resolve(parsedData); + } catch (e) { + reject(e); + } + }); + }) + + req.on('error', (error) => { + reject(error); + }) + }) +} + +function getReleaseInfo(release) { + const assets = release.assets || []; + const os = process.platform; + const arch = process.arch; + let targetAsset; + switch (os) { + case 'darwin': + targetAsset = assets.filter((asset) => asset.name.indexOf('darwin') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + case 'linux': + targetAsset = assets.filter((asset) => asset.name.indexOf('linux') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + case 'win32': + targetAsset = assets.filter((asset) => asset.name.indexOf('windows') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + default: + targetAsset = { size: 0, browser_download_url: '' }; + } + return { size: targetAsset.size, browser_download_url: targetAsset.browser_download_url, version: targetAsset.name }; +} + +// async function downloadReleaseFile(releaseAsset) { +// const dest = os.homedir(); +// const releaseURL = releaseAsset.browser_download_url; + +// console.log("Downloading", releaseURL); +// const baseName = releaseURL.substr(releaseURL.lastIndexOf("/") + 1); +// return releaseDownloader.downloadAsset(releaseURL, baseName, dest, () => { +// process.stdout.write("."); +// }); +// } + +// function decompressRelease(path) { +// const dest = os.homedir(); +// return decompress(path, filepath.join(dest, 'kics'), { +// plugins: [ +// decompressTargz() +// ] +// }); +// } + +// function getExecutableName() { +// const os = process.platform; +// switch (os) { +// case 'darwin': +// case 'linux': +// return 'kics'; +// case 'win32': +// return 'kics.exe'; +// default: +// return 'kics'; +// } +// } + +async function installKICS(kicsVersion) { + let release = {}; + if (!kicsVersion || kicsVersion == "latest") { + release = await getVersion("latest"); + } else { + release = await getVersion(kicsVersion); + } + const releaseInfo = getReleaseInfo(release) + + const kicsDownloadPath = await tc.downloadTool(releaseInfo.browser_download_url); + const kicsExtractedFolder = await tc.extractTar(kicsDownloadPath, filepath.join(os.homedir(), 'kics', releaseInfo.version)); + const cachedPath = await tc.cacheDir(kicsExtractedFolder, 'kics', releaseInfo.version); + core.addPath(cachedPath); + + // const releasePath = await downloadReleaseFile(releaseAsset, "./") + // console.log('\nDownloaded KICS release', releasePath); + // const files = await decompressRelease(releasePath); + // console.log('\nDecompressed KICS release', files.map(f => f.path)); + + // const kicsPath = filepath.join(os.homedir(), 'kics', getExecutableName()); + // console.log('\nInstalling KICS to', kicsPath); + return kicsPath; +} + +module.exports = { + installKICS +} \ No newline at end of file diff --git a/src/main.js b/src/main.js new file mode 100644 index 0000000..4c7f419 --- /dev/null +++ b/src/main.js @@ -0,0 +1,29 @@ +const install = require("./install"); +const commenter = require("./commenter"); +const scanner = require("./scanner"); +const core = require("@actions/core"); + +const actionInputs = { + kics_version: { value: core.getInput('kics_version') }, + enable_pr_comments: { value: core.getInput('enable_pr_comments') }, +} + +async function main() { + console.log("Running KICS action..."); + try { + // const context = github.context; + // const repository = context.repo; + // const pullRequestNumber = context.payload.pull_request.number; + const kicsPath = await install.installKICS(actionInputs.kics_version.value); + console.log("KICS installed at: " + kicsPath); + //await scanner.scanWithKICS(kicsPath); + // if (actionInputs.enable_pr_comments.value === "true") { + // await commenter.commentOnPullRequest(repository, pullRequestNumber); + // } + } catch (e) { + console.error(e); + core.setFailed(e.message); + } +} + +main(); \ No newline at end of file diff --git a/src/scanner.js b/src/scanner.js new file mode 100644 index 0000000..3eac527 --- /dev/null +++ b/src/scanner.js @@ -0,0 +1,38 @@ +const exec = require('@actions/exec'); + +const core = require("@actions/core"); + +const kicsInputs = { + path: { flag: '--path', value: core.getInput('path') }, + ignore_on_exit: { flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, + fail_on: { flag: '--fail-on', value: core.getInput('fail_on') }, + timeout: { flag: '--timeout', value: core.getInput('timeout') }, + profiling: { flag: '--profiling', value: core.getInput('profiling') }, + config_path: { flag: '--config', value: core.getInput('config_path') }, + payload_path: { flag: '--payload-path', value: core.getInput('payload_path') }, + exclude_paths: { flag: '--exclude-paths', value: core.getInput('exclude_paths') }, + exclude_queries: { flag: '--exclude-queries', value: core.getInput('exclude_queries') }, + exclude_categories: { flag: '--exclude-categories', value: core.getInput('exclude_categories') }, + exclude_results: { flag: '--exclude-results', value: core.getInput('exclude_results') }, + output_formats: { flag: '--report-formats', value: core.getInput('output_formats') }, + output_path: { flag: '--output-path', value: core.getInput('output_path') }, + queries: { flag: '--queries-path', value: core.getInput('queries') }, + verbose: { flag: '--verbose', value: core.getInput('verbose') }, + secrets_regexes_path: { flag: '--secrets-regexes-path', value: core.getInput('secrets_regexes_path') }, + libraries_path: { flag: '--libraries-path', value: core.getInput('libraries-path') }, + disable_secrets: { flag: '--disable-secrets', value: core.getInput('disable_secrets') }, + disable_full_descriptions: { flag: '--disable-full-descriptions', value: core.getInput('disable_full_descriptions') }, + types: { flag: '--types', value: core.getInput('types') }, + bom: { flag: '--bom', value: core.getInput('bom') }, +}; + +async function scanWithKICS(kicsPath) { + let statusCode = 0; + if (kicsInputs.config_path.value) { + statusCode = await exec.exec(`${kicsPath} scan ${kicsInputs.config_path.flag} ${kicsInputs.config_path.value}`); + } +} + +module.exports = { + scanWithKICS +}; \ No newline at end of file